General
-
Target
KatanaBeta.exe
-
Size
229KB
-
Sample
240817-vytdaazgln
-
MD5
f6f744441dfded289e9f80124b42cd7b
-
SHA1
e097b009936023a9f7672bc1fb956ad45a07e9ad
-
SHA256
a6691d55b146c79be7721277050c0f6c11130fa826cda7d78a4d529afefe3221
-
SHA512
4cfec12b594cad710954dc25dee05b185c4917640d6ccd3778487a40ee73b0d08bc7cdd8787b2a9d331783d3de9d52535f8ed73b82a2de22331e4b81b49b1e6d
-
SSDEEP
6144:FloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSni:HoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQi
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1267710453140951191/IIRxpE0xbpWEQdtzIur3qQkpJXN_Y7Z0eY8h8JOoQYGP2oBxcIKX2ZtY3K4AB1WZ5D5d
Targets
-
-
Target
KatanaBeta.exe
-
Size
229KB
-
MD5
f6f744441dfded289e9f80124b42cd7b
-
SHA1
e097b009936023a9f7672bc1fb956ad45a07e9ad
-
SHA256
a6691d55b146c79be7721277050c0f6c11130fa826cda7d78a4d529afefe3221
-
SHA512
4cfec12b594cad710954dc25dee05b185c4917640d6ccd3778487a40ee73b0d08bc7cdd8787b2a9d331783d3de9d52535f8ed73b82a2de22331e4b81b49b1e6d
-
SSDEEP
6144:FloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSni:HoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQi
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1