General
-
Target
Exoticgen.exe
-
Size
235KB
-
Sample
240801-b1431szakc
-
MD5
099c16c602df2d705c4f68add9f4dcd7
-
SHA1
a35dfa3f01bef023bd4170cf1c71099f259bc65d
-
SHA256
3a01df550a7bbde4061d91acf6641acad0821c5005bb10c37a659493a1f69f6d
-
SHA512
9055442927d4815a9d584b6881806aa2dded35cc679abf023cc9129efbd499457cc9e184f0f675431134651934984f8fda5a597ee74e6074a44b6887c56f777f
-
SSDEEP
6144:jloZM+rIkd8g+EtXHkv/iD41+Ic5nsAvvOXZkQlu+Sb8e1m2i:BoZtL+EP81+Ic5nsAvvOXZkQlupw
Behavioral task
behavioral1
Sample
Exoticgen.exe
Resource
win7-20240705-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1268287678412099709/Dj10I-JT1wc3TzMxCwDZ914TFiP0ZgKRLH8Cvx8O_wI1ZwXgqie8Nq8vyB2QOhtyingd
Targets
-
-
Target
Exoticgen.exe
-
Size
235KB
-
MD5
099c16c602df2d705c4f68add9f4dcd7
-
SHA1
a35dfa3f01bef023bd4170cf1c71099f259bc65d
-
SHA256
3a01df550a7bbde4061d91acf6641acad0821c5005bb10c37a659493a1f69f6d
-
SHA512
9055442927d4815a9d584b6881806aa2dded35cc679abf023cc9129efbd499457cc9e184f0f675431134651934984f8fda5a597ee74e6074a44b6887c56f777f
-
SSDEEP
6144:jloZM+rIkd8g+EtXHkv/iD41+Ic5nsAvvOXZkQlu+Sb8e1m2i:BoZtL+EP81+Ic5nsAvvOXZkQlupw
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1