General
-
Target
SolaraB.exe
-
Size
229KB
-
Sample
240727-fxfngayhlk
-
MD5
48baa0394f0e53ec2e19d99a3b98a400
-
SHA1
723638a8779f3ed8d195fdc1af92bd2036ec1ca6
-
SHA256
186b386185fc93d31a827f9a711ceb0134e85cd91acf0d8b622b891bda751e79
-
SHA512
eeab39f6d51059f79d0372cd0b1c2197ac08f53a94068b070a63c28344a92e8d4f521e6b0f0a172e950fcbd17c22a707a7d0cbad3209669b868822651b023c53
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4G//Hdtxd38e1m+Ji:noZtL+EP8ovnxZe
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1261975574994358322/t7Wb9RVyFWem2P4CyLnAxqjaasqdLq2_609gWzc5jJtyvXqVdwYJFdYrwDHN2wbAvuFH
Targets
-
-
Target
SolaraB.exe
-
Size
229KB
-
MD5
48baa0394f0e53ec2e19d99a3b98a400
-
SHA1
723638a8779f3ed8d195fdc1af92bd2036ec1ca6
-
SHA256
186b386185fc93d31a827f9a711ceb0134e85cd91acf0d8b622b891bda751e79
-
SHA512
eeab39f6d51059f79d0372cd0b1c2197ac08f53a94068b070a63c28344a92e8d4f521e6b0f0a172e950fcbd17c22a707a7d0cbad3209669b868822651b023c53
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4G//Hdtxd38e1m+Ji:noZtL+EP8ovnxZe
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1