General
-
Target
passprocbeta.exe
-
Size
227KB
-
Sample
240826-zbv1tathqh
-
MD5
4ba03d958d930223cdd9b50885365ddf
-
SHA1
f111036fad34212ae876170478f57c8fb2e714be
-
SHA256
6e1f345ac5ec917d43779e0087d731fbdf67645b7e74e83d63c7f21e82fb63aa
-
SHA512
d1e655aebc11e00e7c23a1b37c75ed1207e5b007aaa1a595d18d1738e84c934225c164be507b4f561b8352abaa36294f4413e95d0fd7a6f230d6789a50fd0d15
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4hn9vCg/7IjR0STTKqFb8e1mLi:ooZtL+EP8hn9vCg/7IjR0STTK+d
Behavioral task
behavioral1
Sample
passprocbeta.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1277669556155842652/dWmHHT2f5DvcgOeo78GdA9nR994OUR8OT6UhPMPzy0EAnFhUdEd5H5OV6KNqhZcADm3T
Targets
-
-
Target
passprocbeta.exe
-
Size
227KB
-
MD5
4ba03d958d930223cdd9b50885365ddf
-
SHA1
f111036fad34212ae876170478f57c8fb2e714be
-
SHA256
6e1f345ac5ec917d43779e0087d731fbdf67645b7e74e83d63c7f21e82fb63aa
-
SHA512
d1e655aebc11e00e7c23a1b37c75ed1207e5b007aaa1a595d18d1738e84c934225c164be507b4f561b8352abaa36294f4413e95d0fd7a6f230d6789a50fd0d15
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4hn9vCg/7IjR0STTKqFb8e1mLi:ooZtL+EP8hn9vCg/7IjR0STTK+d
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1