General
-
Target
3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9
-
Size
240KB
-
Sample
240827-y7pcgazfpc
-
MD5
3ab1d460b16ec34493d9d769729a53fc
-
SHA1
e7e379fb8d8390103e53c31f07a52dbd1bc796a1
-
SHA256
3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9
-
SHA512
37d59d665ed891832e3e8efd6b74116bb51230a69b1c5fff53e2aaf8eaaade4d807215dae3bbd26ec5812f8bae55f2d982e975d38c0d6ce684b5b2cea93f2949
-
SSDEEP
6144:vloZMNrIkd8g+EtXHkv/iD4lx4+Clg8e1mbTi:NoZmL+EP8DMwK+
Behavioral task
behavioral1
Sample
3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1277937947240304723/e6aSIKSZZUhEGqX-EkfVX3BFZe9q4cDzASzi5ZjH0SMC7YexS-B3SgsSoakwIqMdOrMu
Targets
-
-
Target
3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9
-
Size
240KB
-
MD5
3ab1d460b16ec34493d9d769729a53fc
-
SHA1
e7e379fb8d8390103e53c31f07a52dbd1bc796a1
-
SHA256
3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9
-
SHA512
37d59d665ed891832e3e8efd6b74116bb51230a69b1c5fff53e2aaf8eaaade4d807215dae3bbd26ec5812f8bae55f2d982e975d38c0d6ce684b5b2cea93f2949
-
SSDEEP
6144:vloZMNrIkd8g+EtXHkv/iD4lx4+Clg8e1mbTi:NoZmL+EP8DMwK+
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-