General
-
Target
Nowatermarks.temp
-
Size
229KB
-
Sample
240809-wjp8ratcnp
-
MD5
79d545d3f6a46db17e8dadba1bf623ae
-
SHA1
f289247a7620ff890ac3d5c87c13445c83b2a02d
-
SHA256
1e94a2848737d3fe8046f4dabcfe94c250be5085802edce428e4dd271f459a19
-
SHA512
bd14dec25736a52f79f8b9e4aede9981ffca9ff78e2dbca875802eff7525495a17c506c69b74b572c5e18aca2c7df05b11adaa1160a65f9e2df1f4e8b5b1f447
-
SSDEEP
6144:lloZMrrIkd8g+EtXHkv/iD4ITZHR/k4XSG/BcoNTo6lm8e1mCKi:noZcL+EP8QZHR/k4XSG/BcoNVSHv
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1271195767931146271/iNqcQXHndflroU3wKuHImLpW56jZ6ZCv7xkqHYGTn6YCeSATY-dipTigRMDm-yI4L0v7
Targets
-
-
Target
Nowatermarks.temp
-
Size
229KB
-
MD5
79d545d3f6a46db17e8dadba1bf623ae
-
SHA1
f289247a7620ff890ac3d5c87c13445c83b2a02d
-
SHA256
1e94a2848737d3fe8046f4dabcfe94c250be5085802edce428e4dd271f459a19
-
SHA512
bd14dec25736a52f79f8b9e4aede9981ffca9ff78e2dbca875802eff7525495a17c506c69b74b572c5e18aca2c7df05b11adaa1160a65f9e2df1f4e8b5b1f447
-
SSDEEP
6144:lloZMrrIkd8g+EtXHkv/iD4ITZHR/k4XSG/BcoNTo6lm8e1mCKi:noZcL+EP8QZHR/k4XSG/BcoNVSHv
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1