General
-
Target
92fe53ca6c8f1a424db45bb3f7cdfe56.bin
-
Size
90KB
-
Sample
240824-bvm8bazgnm
-
MD5
9308a86f49ca2eae9ddda090342aad27
-
SHA1
30802c146864a248927106168c01ad583441c223
-
SHA256
a83df6ed601d8ad1235d1b76af4019e95a24dab4aa64ee7e1267d661e64d18d4
-
SHA512
46334047221599167d28eeb72e22432df1258b90172d5f9a0375a8b14d6639748ea8a51aebcc111cb75c4e3a47e39eda1bd6038b8e501353ecc50086f82bfa85
-
SSDEEP
1536:/dDzLwk/kFPLmgcpJxzJJDun65G+blF03ZurQqeWfarYP9jl0msKrEtWTsgmPG8v:QLmzd9JDk65G+5wynJP9GmPGWxmP7t9
Behavioral task
behavioral1
Sample
bf1ddaef01c54156875f83d24de19811476ad618bf126460a764c0cb13bcf3b7.exe
Resource
win7-20240705-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1272960886117498900/YDNHOw3Kos6nSkhyh1-x7wdT3ReBATEXF8kthHRm5wmUtVhzhv3W6IJn4x78vB7KKS5f
Targets
-
-
Target
bf1ddaef01c54156875f83d24de19811476ad618bf126460a764c0cb13bcf3b7.exe
-
Size
228KB
-
MD5
92fe53ca6c8f1a424db45bb3f7cdfe56
-
SHA1
a6d4e261875b162f18f2cbbcc6411cec7b59be37
-
SHA256
bf1ddaef01c54156875f83d24de19811476ad618bf126460a764c0cb13bcf3b7
-
SHA512
c4ce50e070a07626fd766212428b15df7d4f4fe680acdc9b0ba084156aea4e4443dd76ddba8ff9d9551a5c00b53d784a716caa95df1a78d80a65dd1bca2c4a16
-
SSDEEP
6144:OloZM+rIkd8g+EtXHkv/iD4QL6XYe5xy4XKYZd8PRb8e1mLpsi:YoZtL+EP8QL6XYe5xy4XKYZd8hil
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1