General
-
Target
Ref-Quotation.pdf
-
Size
7KB
-
Sample
240806-t8rrrstgrl
-
MD5
3afee0850cb4ac806103dd7029c99dec
-
SHA1
81db120f09c5ee62d785ea7fc76d2065362d8d3c
-
SHA256
c00313aabcfd55989bbd839a80dcdd52fe4f08911bba68a5f9acfcc463cf8602
-
SHA512
a410572f6aec8153fc5a6f5744ea9064d9730d6c6258a4ac5f244840105afb15fc726e0b9d4b0d28084aeb2dfceceff249b25bcd5b15f846fcc08e6a1004a502
-
SSDEEP
96:YEcrIq5gt/vsHuMp18EtTkYVkZmsJSJlkOCKeLDkaITVIcxe4vnWcrV:2Iq5OvsppmEJl2rAZoDkj7nTV
Behavioral task
behavioral1
Sample
Ref-Quotation.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Ref-Quotation.pdf
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Ref-Quotation.pdf
-
Size
7KB
-
MD5
3afee0850cb4ac806103dd7029c99dec
-
SHA1
81db120f09c5ee62d785ea7fc76d2065362d8d3c
-
SHA256
c00313aabcfd55989bbd839a80dcdd52fe4f08911bba68a5f9acfcc463cf8602
-
SHA512
a410572f6aec8153fc5a6f5744ea9064d9730d6c6258a4ac5f244840105afb15fc726e0b9d4b0d28084aeb2dfceceff249b25bcd5b15f846fcc08e6a1004a502
-
SSDEEP
96:YEcrIq5gt/vsHuMp18EtTkYVkZmsJSJlkOCKeLDkaITVIcxe4vnWcrV:2Iq5OvsppmEJl2rAZoDkj7nTV
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1