General
-
Target
d3ccce85ce8dfc4087cca43248f44920N.exe
-
Size
394KB
-
Sample
240825-144zvszdrm
-
MD5
d3ccce85ce8dfc4087cca43248f44920
-
SHA1
547a8a789d9167946b5e80a1123ff0aedd04be37
-
SHA256
d87db916c3d491a3616f4db964b0af304b44e82240508aae6cf0616939cc937f
-
SHA512
5b025da2ad754d4e95a9d3ca58af01fc666c7350056e92d781cfbf5c76d19eaebecef3bcc4c2fd2c05ae55f9c71581d39f6b57869c22897bf516c99f4a908e8d
-
SSDEEP
6144:YloZMArIkd8g+EtXHkv/iD4BAHCtxdc8e1mQCiNUhcX7elbKTuq9bfF/H9d9n:GoZHL+EP8y2xw5XN3X3uO
Behavioral task
behavioral1
Sample
d3ccce85ce8dfc4087cca43248f44920N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3ccce85ce8dfc4087cca43248f44920N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1272664137763393670/JPb5q1OpnwuHleFJcm8agYhCNooeHlNojD8boHLf9oz1TIRIZ19Jz1eiAMETB0SUKNAS
Targets
-
-
Target
d3ccce85ce8dfc4087cca43248f44920N.exe
-
Size
394KB
-
MD5
d3ccce85ce8dfc4087cca43248f44920
-
SHA1
547a8a789d9167946b5e80a1123ff0aedd04be37
-
SHA256
d87db916c3d491a3616f4db964b0af304b44e82240508aae6cf0616939cc937f
-
SHA512
5b025da2ad754d4e95a9d3ca58af01fc666c7350056e92d781cfbf5c76d19eaebecef3bcc4c2fd2c05ae55f9c71581d39f6b57869c22897bf516c99f4a908e8d
-
SSDEEP
6144:YloZMArIkd8g+EtXHkv/iD4BAHCtxdc8e1mQCiNUhcX7elbKTuq9bfF/H9d9n:GoZHL+EP8y2xw5XN3X3uO
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-