General
-
Target
ogasda.exe
-
Size
229KB
-
Sample
240804-n4zc6avbnk
-
MD5
33a10c04946e6aebc438b7cba8b42140
-
SHA1
f4b94c6914cabde06072676547af27d1864373e6
-
SHA256
f2ee9f8cda21c09cf9351463d0cc4dbe1d11ae8dadd8ebfc160ac436d186265e
-
SHA512
39d288585b07eb81d82ba4f7b475782223b141804e2d1d5c2dae3077f6b7cb2f7778b36e1aa77388ac60fd9a6998b70fe5e99ff302dc23f5ca10c8c373212f1a
-
SSDEEP
6144:lloZMCrIkd8g+EtXHkv/iD4ZeBZAmB5Kh/Cwhl0YSb8e1m6oOUi:noZZL+EP8ZeBZAmB5Kh/Cwhl0H9
Behavioral task
behavioral1
Sample
ogasda.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ogasda.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1269231535564001326/-DNI1DVGwiK_7lLyYmcI6Sv3019WqD3npLPhCO2Tq59p_TFJXb7iYY74NuLR9AOskph3
Targets
-
-
Target
ogasda.exe
-
Size
229KB
-
MD5
33a10c04946e6aebc438b7cba8b42140
-
SHA1
f4b94c6914cabde06072676547af27d1864373e6
-
SHA256
f2ee9f8cda21c09cf9351463d0cc4dbe1d11ae8dadd8ebfc160ac436d186265e
-
SHA512
39d288585b07eb81d82ba4f7b475782223b141804e2d1d5c2dae3077f6b7cb2f7778b36e1aa77388ac60fd9a6998b70fe5e99ff302dc23f5ca10c8c373212f1a
-
SSDEEP
6144:lloZMCrIkd8g+EtXHkv/iD4ZeBZAmB5Kh/Cwhl0YSb8e1m6oOUi:noZZL+EP8ZeBZAmB5Kh/Cwhl0H9
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-