General
-
Target
Byte_Guard_Cracked.exe
-
Size
4.3MB
-
Sample
240818-r827dsyelb
-
MD5
d7936c64138b924d63901cedb2c6cd09
-
SHA1
b525dd212eac4c808b5166880976b1817caf826b
-
SHA256
52124dea5ce1c6296873462826b58cf7ced4bc5bff6092af5950769482962339
-
SHA512
3c2e8b6b1de63baeda4fb714ab3f4104f820cf81d2bbe9d4177631246b7627ac1e76c709a57504ca777dfdbcc74aab95602184a270120f653832f37e4965d3f7
-
SSDEEP
98304:dnsmtk2a2052wnEFsuU8agxdazsYXhDqgAdXt2:BL4n7uB8zpXcnb2
Static task
static1
Behavioral task
behavioral1
Sample
Byte_Guard_Cracked.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Byte_Guard_Cracked.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1271910498107129856/6QtgJK8NkWoaobhUacej3NEYw3eYaasAKEEehxN04UR57cdaVkLvywYwnoPhZkUSYxdW
Targets
-
-
Target
Byte_Guard_Cracked.exe
-
Size
4.3MB
-
MD5
d7936c64138b924d63901cedb2c6cd09
-
SHA1
b525dd212eac4c808b5166880976b1817caf826b
-
SHA256
52124dea5ce1c6296873462826b58cf7ced4bc5bff6092af5950769482962339
-
SHA512
3c2e8b6b1de63baeda4fb714ab3f4104f820cf81d2bbe9d4177631246b7627ac1e76c709a57504ca777dfdbcc74aab95602184a270120f653832f37e4965d3f7
-
SSDEEP
98304:dnsmtk2a2052wnEFsuU8agxdazsYXhDqgAdXt2:BL4n7uB8zpXcnb2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Umbral payload
-
AgentTesla payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1