General
-
Target
drivers.exe
-
Size
229KB
-
Sample
240823-symvdsvejk
-
MD5
8275af467a6e5859869a13eabc03cc15
-
SHA1
e70d0630ff34f6a1c72ab4343dc01c6dd4c53bc1
-
SHA256
5c37ed0542974bf478e1e6ff614395e6110bfc4726494e72f76b62e014bda0ff
-
SHA512
87497047b564694a15193d6b5e7d13fbfbbeeec2f14993c09a79b52fa9781ede36136d1c688d264ccd2c45ea93d5f372c210ae54066de02e3abf7d15428d4e6a
-
SSDEEP
6144:lloZMLrIkd8g+EtXHkv/iD4yEay5nsAv4OXZkQlpAb8e1mGi:noZ0L+EP8yEay5nsAv4OXZkQlu4
Behavioral task
behavioral1
Sample
drivers.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
drivers.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1276496146457559101/7_ptjDJWGansgnKVEYj-y4twxeR0-GnxdWKRrpBdnWLsTnqJjDk6El_U4WBbHCbTb1bd
Targets
-
-
Target
drivers.exe
-
Size
229KB
-
MD5
8275af467a6e5859869a13eabc03cc15
-
SHA1
e70d0630ff34f6a1c72ab4343dc01c6dd4c53bc1
-
SHA256
5c37ed0542974bf478e1e6ff614395e6110bfc4726494e72f76b62e014bda0ff
-
SHA512
87497047b564694a15193d6b5e7d13fbfbbeeec2f14993c09a79b52fa9781ede36136d1c688d264ccd2c45ea93d5f372c210ae54066de02e3abf7d15428d4e6a
-
SSDEEP
6144:lloZMLrIkd8g+EtXHkv/iD4yEay5nsAv4OXZkQlpAb8e1mGi:noZ0L+EP8yEay5nsAv4OXZkQlu4
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-