General
-
Target
Nigger.exe
-
Size
229KB
-
Sample
240830-z5nhtswemf
-
MD5
b193c3e09096fe11bdec07aa6979c372
-
SHA1
07f36f115e4a41bb4b1312d6ff889ec78e895475
-
SHA256
bebc73eac9a6a619320ae91da7081d60f1ef3529b0b4ac3968afea5493374683
-
SHA512
6e39a6a8ae2e9b44065791aca4cc9bd305ac221ba135d654bfa397ce8b52f0bfcbf45eb7dcbed43d3cd028c4ee123d7722f1a3cf55ecbc017fdb1b51905a0e7a
-
SSDEEP
6144:9loZM+rIkd8g+EtXHkv/iD4K0W7p3cw/CeHp0AV+7b8e1mSi:foZtL+EP8K0W7p3cw/CeHp0AVE0
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1279187968363335730/KgEmSaRaf-PAW_bOz42umy_7vXT9iX0dpAsy-Ge4nFSSs9yefJNXlGJpk-kaFbECHG2c
Targets
-
-
Target
Nigger.exe
-
Size
229KB
-
MD5
b193c3e09096fe11bdec07aa6979c372
-
SHA1
07f36f115e4a41bb4b1312d6ff889ec78e895475
-
SHA256
bebc73eac9a6a619320ae91da7081d60f1ef3529b0b4ac3968afea5493374683
-
SHA512
6e39a6a8ae2e9b44065791aca4cc9bd305ac221ba135d654bfa397ce8b52f0bfcbf45eb7dcbed43d3cd028c4ee123d7722f1a3cf55ecbc017fdb1b51905a0e7a
-
SSDEEP
6144:9loZM+rIkd8g+EtXHkv/iD4K0W7p3cw/CeHp0AV+7b8e1mSi:foZtL+EP8K0W7p3cw/CeHp0AVE0
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1