General
-
Target
GeforceChair0.22.exe
-
Size
231KB
-
Sample
240730-ebh12aterq
-
MD5
4889fe4c6bc9c53e9e53983517727fa8
-
SHA1
3964bac164a7cdc3a0cddd46f8d3aab5e568b515
-
SHA256
91a8f24b813ec8f33e1222a9996cdfe5c4c0dd56cb922a113a87953878b065a9
-
SHA512
f44368d7406db49db31b13f578e968a053e100d49cd2dbf05dabe3a4f3e9412e8fd2ce6ac0c363f34091f5e7af78769ca0cc1b6020f7e8e9a313813a575c7100
-
SSDEEP
6144:BloZM0rIkd8g+EtXHkv/iD4i/QClL8e1m+cOi:zoZDL+EP8IpHE
Behavioral task
behavioral1
Sample
GeforceChair0.22.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GeforceChair0.22.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1267404483273425028/k8YQeawmuuhmsYpDBs-Q6wJ2H_HeFS9SmCMW95XmRdznY1Eahh4m5w0agoLNs5B1b65I
Targets
-
-
Target
GeforceChair0.22.exe
-
Size
231KB
-
MD5
4889fe4c6bc9c53e9e53983517727fa8
-
SHA1
3964bac164a7cdc3a0cddd46f8d3aab5e568b515
-
SHA256
91a8f24b813ec8f33e1222a9996cdfe5c4c0dd56cb922a113a87953878b065a9
-
SHA512
f44368d7406db49db31b13f578e968a053e100d49cd2dbf05dabe3a4f3e9412e8fd2ce6ac0c363f34091f5e7af78769ca0cc1b6020f7e8e9a313813a575c7100
-
SSDEEP
6144:BloZM0rIkd8g+EtXHkv/iD4i/QClL8e1m+cOi:zoZDL+EP8IpHE
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-