General
-
Target
d97cfbdcbd68d0080286dde7cb1906e84c954d5471f08ba98608c5f3b6af3f2d
-
Size
230KB
-
Sample
240816-e4qxcazaqr
-
MD5
553d6d65dbaee07e841b22b0987c0331
-
SHA1
499325af4eb554638411e3e47b146cc8662f693a
-
SHA256
d97cfbdcbd68d0080286dde7cb1906e84c954d5471f08ba98608c5f3b6af3f2d
-
SHA512
e4b3c0b1211ce292eb7a781e98da5960936e28abd84f473c66105217e9de505f89fee1b46ac776953403d0aa433d47226c3f0b6dbfd5dd3cc7b4a44058964e96
-
SSDEEP
6144:dloZM+rIkd8g+EtXHkv/iD4mEHhtxds8e1minfi:/oZtL+EP8Trx86
Behavioral task
behavioral1
Sample
d97cfbdcbd68d0080286dde7cb1906e84c954d5471f08ba98608c5f3b6af3f2d.exe
Resource
win7-20240704-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1273654743541219463/LiRtpjZrXJ-Jq6D6rmaHPRqkGmJ-O6FGNmo8-PwElrHuhnARicowKD2I8Ei3JuuXkhNp
Targets
-
-
Target
d97cfbdcbd68d0080286dde7cb1906e84c954d5471f08ba98608c5f3b6af3f2d
-
Size
230KB
-
MD5
553d6d65dbaee07e841b22b0987c0331
-
SHA1
499325af4eb554638411e3e47b146cc8662f693a
-
SHA256
d97cfbdcbd68d0080286dde7cb1906e84c954d5471f08ba98608c5f3b6af3f2d
-
SHA512
e4b3c0b1211ce292eb7a781e98da5960936e28abd84f473c66105217e9de505f89fee1b46ac776953403d0aa433d47226c3f0b6dbfd5dd3cc7b4a44058964e96
-
SSDEEP
6144:dloZM+rIkd8g+EtXHkv/iD4mEHhtxds8e1minfi:/oZtL+EP8Trx86
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1