General
-
Target
Katana Cod.zip
-
Size
230KB
-
Sample
240817-vxmt4sxcna
-
MD5
a389ce9a2572a8eed2b7800ba5b34a6e
-
SHA1
27cd21988ae7c5c16ce6a0320253766881180de9
-
SHA256
92b29151b184cbbc1227cdf1fec858cb8145d5f03516b9199dba669dae30f6b8
-
SHA512
d9f5a88362e9276786f56ccd93a8b3d9d3138a240b12025b68c7b8af00eee02bd28b24b1ab16e266e4330becf594b9ecd0ca8b99c9fe80db6fb91efe3537a926
-
SSDEEP
6144:TloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSniB:RoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQiB
Behavioral task
behavioral1
Sample
Katana Cod/KatanaBeta.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Katana Cod/Key.bat
Resource
win11-20240802-en
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1267710453140951191/IIRxpE0xbpWEQdtzIur3qQkpJXN_Y7Z0eY8h8JOoQYGP2oBxcIKX2ZtY3K4AB1WZ5D5d
Targets
-
-
Target
Katana Cod/KatanaBeta.exe
-
Size
229KB
-
MD5
f6f744441dfded289e9f80124b42cd7b
-
SHA1
e097b009936023a9f7672bc1fb956ad45a07e9ad
-
SHA256
a6691d55b146c79be7721277050c0f6c11130fa826cda7d78a4d529afefe3221
-
SHA512
4cfec12b594cad710954dc25dee05b185c4917640d6ccd3778487a40ee73b0d08bc7cdd8787b2a9d331783d3de9d52535f8ed73b82a2de22331e4b81b49b1e6d
-
SSDEEP
6144:FloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSni:HoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQi
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Katana Cod/Key.bat
-
Size
170B
-
MD5
2764b21ad2de14120c5112b2c1f6dc86
-
SHA1
b8abe759e209d15a680e2489b92b09e459eeb78d
-
SHA256
dac55f22844c85a10ba5e31c7d8bb4736006c95ebaa40a8ec1170949825b971f
-
SHA512
efbc9f35ccb1e2f075f18750bf250d2223a50f6a164cfd1781197e3eec171d945e8c3854608df0281eca2bc55e8901d5f81761841d5f78e66e04f9a8a1c3d428
Score1/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1