General
-
Target
a8c74a05f574514ec74cb942ec0ff1d5380da648e145ba829dec4cc511ec4cd7
-
Size
92KB
-
Sample
240829-f4ae2awamg
-
MD5
428c94c72ecc3c8056e7b9bf927628c4
-
SHA1
78360122f0dee4a0ef75b1de4e062b1c6ecc58e5
-
SHA256
a8c74a05f574514ec74cb942ec0ff1d5380da648e145ba829dec4cc511ec4cd7
-
SHA512
6ed4159197625f6379dc7d509ee01c123fadd7b6cfb6658e7ad7b3b8997d75cea900f15b684c493d9599386f172c86d439598d770c1166144f3a4526b3030561
-
SSDEEP
1536:iuyd8rwgjEoMo3DM76gO9cKc51RqbtIQ80i+gcxfYacF6oufFB7jPV+sUq01UEic:ogjdMGg4cKc5gIzDhau0BPPiLSk3h
Behavioral task
behavioral1
Sample
5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1240617539009249350/TqBzgc6PPLDK8U9sL3OIQ7VPVwnDIoONcaMLCG9G1Uo5vMQ9KEFuAEkuqQ_6XKEkyetX
Targets
-
-
Target
5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
-
Size
229KB
-
MD5
eabe2a81aa3dabab25e49ee4b36ce075
-
SHA1
f55b6298f0a8330d90d39e20a73adb2e828dfd1c
-
SHA256
5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686
-
SHA512
9688119150d3a466d9a12bfc55933d367104747a2cf319467a78dfcf975361c9e2727f76efe380db9d0c92c39dc4b0241bfb444e965e92720c9edcf42c1d18fe
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4Wn0IZHMgPou35EwFyov28e1mpi:noZtL+EP8Wn0IZHMgPou35EwFm1
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1