General
-
Target
Umbral1.exe
-
Size
227KB
-
Sample
240803-wdfgcszgql
-
MD5
f6aeb1204375bc9a4ea0cfa7a1a76ba5
-
SHA1
e659b3e54d32f44bf915d64c51bb512e58a7eeea
-
SHA256
0ddc72fe91b271d21fbaafd017168c9b5370d362d7bd3e60928490ab4d1fac96
-
SHA512
75ffba3ec1f5e05684ab0b99af42a518735324355745f0f9e3ba057627b746a948b86331e281db1bc2064f504af334118cb29807cb97b6579723e144d7acbd41
-
SSDEEP
6144:+loZMLrIkd8g+EtXHkv/iD44VShOsTPkZFQu//OzCb8e1mJdi:ooZ0L+EP84VShOsTPkZFQu//O6B
Behavioral task
behavioral1
Sample
Umbral1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Umbral1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1268994498789118136/wdCgBN75mgZansODldWwpt19cwl4Du5oYshkYt-juoCAF_n-WC5lHOIdR6Ww9M9mxDJl
Targets
-
-
Target
Umbral1.exe
-
Size
227KB
-
MD5
f6aeb1204375bc9a4ea0cfa7a1a76ba5
-
SHA1
e659b3e54d32f44bf915d64c51bb512e58a7eeea
-
SHA256
0ddc72fe91b271d21fbaafd017168c9b5370d362d7bd3e60928490ab4d1fac96
-
SHA512
75ffba3ec1f5e05684ab0b99af42a518735324355745f0f9e3ba057627b746a948b86331e281db1bc2064f504af334118cb29807cb97b6579723e144d7acbd41
-
SSDEEP
6144:+loZMLrIkd8g+EtXHkv/iD44VShOsTPkZFQu//OzCb8e1mJdi:ooZ0L+EP84VShOsTPkZFQu//O6B
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-