General
-
Target
Kioscene Softdrive v2.10.exe
-
Size
229KB
-
Sample
240802-ssvytazarl
-
MD5
18dff45f8e9eb29b0fb13e341bdd8dfc
-
SHA1
768114e6ed8a6dab7eec0e677d53430c37e5393e
-
SHA256
dfaadfbf1693ea477fde1a960b20280daa82e35128f537a62859bc5aeff9a948
-
SHA512
ace88964c82470394bd18f6b1ca16fecdf3394b0900f0b375dc358bd8577828e7041c35d9bb790b9d91b062df9167963221f6c7ab62740c6f5ae1e9861c5f223
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD44lU3HdmOhOU9va6v1Nb8e1mpi:noZtL+EP84lU3HdmOhOU9va6vXj
Behavioral task
behavioral1
Sample
Kioscene Softdrive v2.10.exe
Resource
win7-20240704-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1268792358443679786/BLaBLMMa4NWUzHHIdleoWZKehmVAekW_z3wN7Yc2GEAkdMnni-xyyUOgxC4wH7tVKOFK
Targets
-
-
Target
Kioscene Softdrive v2.10.exe
-
Size
229KB
-
MD5
18dff45f8e9eb29b0fb13e341bdd8dfc
-
SHA1
768114e6ed8a6dab7eec0e677d53430c37e5393e
-
SHA256
dfaadfbf1693ea477fde1a960b20280daa82e35128f537a62859bc5aeff9a948
-
SHA512
ace88964c82470394bd18f6b1ca16fecdf3394b0900f0b375dc358bd8577828e7041c35d9bb790b9d91b062df9167963221f6c7ab62740c6f5ae1e9861c5f223
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD44lU3HdmOhOU9va6v1Nb8e1mpi:noZtL+EP84lU3HdmOhOU9va6vXj
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1