General
-
Target
PaypalChecker.zip
-
Size
3.4MB
-
Sample
240824-t9fe5a1eql
-
MD5
2eac9882988865735a9fcac9b27c8513
-
SHA1
c61472ba372f13996a34d434df0b2e425fba2d00
-
SHA256
5e2d0c0c469f7124301525e041d4184eff6ccf3c930f269dcf20a8ae4aed704f
-
SHA512
fafef510d02a945dcbc53a4f22f53a476c0c894f8c27f6df40a0af84b4b520450dba20c7094d3da1b1a4ef4ffb26b05e5bdad8cdc9ae03fd8b73d21d371baa15
-
SSDEEP
98304:Xc7oZLxDk40d7JslYeCP6gxD38GeEYvop/3cc0YuQnj3k8DHEFc:TZLxTkN4YeQ6gR8GRYvop/LKQnz5LMc
Behavioral task
behavioral1
Sample
PaypalChecker/PaypalChecker.exe
Resource
win7-20240705-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1271546218732060682/Q59krQGS2fgaa85eefEolChXWvoWRK_k6m6qA1hperoqPEnOrm9iJBnm0weV30aGJei1
Targets
-
-
Target
PaypalChecker/PaypalChecker.exe
-
Size
241KB
-
MD5
51b45616b6902c84fed4f09c0ae52fca
-
SHA1
39f490a578c996ec11601b203c600c7746cb9802
-
SHA256
4b7bc1185048cb51fde3554326846cf426d7e1d3aa372349adb8c6e921762ce6
-
SHA512
b7e6e95072e0b27bb2aad79e6f1ad6f17000bd724e752679ddaead7c50655e52a37b5b082db7c1173992873bc4c61ded852cd605b4b5620f176772be0d31df31
-
SSDEEP
6144:wloZM+rIkd8g+EtXHkv/iD4YMVIp3cw/9eHp0AV39b8e1mSfi5F:+oZtL+EP8YMVIp3cw/9eHp0AVNpKr
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1