General
-
Target
gaming code - Copy.exe
-
Size
493KB
-
Sample
240813-2qey9avepr
-
MD5
7b2b4e725655f63a945798bb6ba47dbc
-
SHA1
4abbeff4849c0be54600e4763104c8cf57e7b741
-
SHA256
c1e68c823f44e06715698c6685c9507ad6406e61b343aa1d69a2ff9a846407db
-
SHA512
adc86f43f0e00ecf7ec0484bb19acfce94f7156ac740606e094ea80cdb2794b0b0082d010137702f3f6f3d6f903d1c6ba841fa13141f8d10ddd7e04f1577442a
-
SSDEEP
12288:zoZtL+EP83ZeP4+ZRSd3q459cOI7k0u5DD7Z446cK+hjqiU:9I8peP4+ZRSd3q459cOIw0u5DD7Z446l
Behavioral task
behavioral1
Sample
gaming code - Copy.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1272345063858638869/l-oiQrUcEdcZBLQWfd1460QMlq2XcFjaVAy_aV94D3lRygxhXqjWiXk2DnbyaCoM95g-
Targets
-
-
Target
gaming code - Copy.exe
-
Size
493KB
-
MD5
7b2b4e725655f63a945798bb6ba47dbc
-
SHA1
4abbeff4849c0be54600e4763104c8cf57e7b741
-
SHA256
c1e68c823f44e06715698c6685c9507ad6406e61b343aa1d69a2ff9a846407db
-
SHA512
adc86f43f0e00ecf7ec0484bb19acfce94f7156ac740606e094ea80cdb2794b0b0082d010137702f3f6f3d6f903d1c6ba841fa13141f8d10ddd7e04f1577442a
-
SSDEEP
12288:zoZtL+EP83ZeP4+ZRSd3q459cOI7k0u5DD7Z446cK+hjqiU:9I8peP4+ZRSd3q459cOIw0u5DD7Z446l
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1