General
-
Target
0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb.exe
-
Size
229KB
-
Sample
240806-be46wsvajm
-
MD5
ae3713305401315a3b520e84fb786fe5
-
SHA1
914bd258c204e4cddab9dc0dbfb9c7134659ad57
-
SHA256
0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb
-
SHA512
ae29d0c4c9106dcfbd4a212968d7d8b87236c2f39ce37435d3a658fe1b42875e44cc65c98f818391a8051312811b51da747efef5fa347f3a053b58454bd1e155
-
SSDEEP
6144:dloZM3fsXtioRkts/cnnK6cMlpGZ7lTwk7tiTlwsJtSb8e1mdi:/oZ1tlRk83MlpGZ7lTwk7tiTlwsJIH
Behavioral task
behavioral1
Sample
0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb.exe
Resource
win7-20240704-en
Malware Config
Extracted
umbral
https://ptb.discord.com/api/webhooks/1193833046810566716/Ip5p47J2qEw7d2YvXLGh3HLrizvUKpbZJnMXQxzQS4N9EYMFmhbB3hhBZhMwKm0ApaPL
Targets
-
-
Target
0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb.exe
-
Size
229KB
-
MD5
ae3713305401315a3b520e84fb786fe5
-
SHA1
914bd258c204e4cddab9dc0dbfb9c7134659ad57
-
SHA256
0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb
-
SHA512
ae29d0c4c9106dcfbd4a212968d7d8b87236c2f39ce37435d3a658fe1b42875e44cc65c98f818391a8051312811b51da747efef5fa347f3a053b58454bd1e155
-
SSDEEP
6144:dloZM3fsXtioRkts/cnnK6cMlpGZ7lTwk7tiTlwsJtSb8e1mdi:/oZ1tlRk83MlpGZ7lTwk7tiTlwsJIH
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1