General
-
Target
zetcheats.rar
-
Size
234KB
-
Sample
240825-rbfxwsxhje
-
MD5
9021e511366e5bca56a3aee33bcd02d1
-
SHA1
49d4ec33d0d1bc0f80560ce87ee751be559ade48
-
SHA256
732efb009641d9d8d38ad223649018ce8d0521f0e03c34112221d0525dda7855
-
SHA512
803fd74d45ad9acde6d74fb29b08ffc6906650e5d353d8da35bf4b4dc6021948879446efa58a099747db606573b6f42ed00add3d1d30f5f00be3cdd90484f2ae
-
SSDEEP
3072:QcJ0FH2Not2cvyAglXz4KtJ9BMqc7OBcERQP4/w6+TH2lFh2c5JHNYn1YJ60a:gdNqAgtz4KN5pBhRKx6gH4bzTHNY0a
Behavioral task
behavioral1
Sample
zetcheats/zetcheats.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
zetcheats/zetcheats.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1276853076103397458/6HXVSbE_AkPTnHXPWSqE7R6BZEz8c-DN__uq16DZfNyzHcoPxLFW5-ZbkHlh1PYswhx8
Targets
-
-
Target
zetcheats/zetcheats.exe
-
Size
229KB
-
MD5
a5136c56ea838074a1b521860a45086c
-
SHA1
576f08a6e5e4ee6f0a438e5c58506e059497d015
-
SHA256
d4f221f62d10617dbbac44172e5e1d5b106a47c69ac4a2426eff77c9485c0707
-
SHA512
1dd818b836c898b85459d42f8163be1926149b569c3f918b994f89ddaea7939a27324b6964140008fa394cda77aa84f468361416a7db5ddcc8bba9ff5bc4c5c3
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4ClRVw2xpacPyAxVkQIb8e1mvi:noZtL+EP8ClRVw2xpacPyAxVklN
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1