General
-
Target
uhmuhh.exe
-
Size
229KB
-
Sample
240808-t7jd1awdln
-
MD5
0d407796194f47dd4739950f347631dc
-
SHA1
2e843294cd4ccbdcb53b0ca4cdcb0d6640d75615
-
SHA256
1ab54a5786eeedb01e74215a50a796fefbd12c47c0b864b1be5f6d45a2951bf4
-
SHA512
b70550be02cc4b622fa35c0189884104a2b6719e8b593e156b74874cffc835a906df3b746b2247c2bffffbb47be6470ba3ac16cb2c8e163785f64650c43a4b97
-
SSDEEP
6144:tloZMNrIkd8g+EtXHkv/iD41KaC9rI8j867NokRQg4db8e1mAG+Iwi:voZmL+EP81KaC9rI8j867NokRQgkC+Ip
Behavioral task
behavioral1
Sample
uhmuhh.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
uhmuhh.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1271141434103169109/ZGzKrH_1KmFwmD5L6kWIR8gCyf2CGPFd_mKQUDOFv2JFuE-13CviLcUsxJZlpFmd_je3
Targets
-
-
Target
uhmuhh.exe
-
Size
229KB
-
MD5
0d407796194f47dd4739950f347631dc
-
SHA1
2e843294cd4ccbdcb53b0ca4cdcb0d6640d75615
-
SHA256
1ab54a5786eeedb01e74215a50a796fefbd12c47c0b864b1be5f6d45a2951bf4
-
SHA512
b70550be02cc4b622fa35c0189884104a2b6719e8b593e156b74874cffc835a906df3b746b2247c2bffffbb47be6470ba3ac16cb2c8e163785f64650c43a4b97
-
SSDEEP
6144:tloZMNrIkd8g+EtXHkv/iD41KaC9rI8j867NokRQg4db8e1mAG+Iwi:voZmL+EP81KaC9rI8j867NokRQgkC+Ip
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-