General
-
Target
Loader.exe
-
Size
229KB
-
Sample
240901-zqmyrasbnh
-
MD5
8ec99595eb4b466b230b36944ec38d62
-
SHA1
bd7127e7b3b3bafc56699168c69099ea15897ee8
-
SHA256
f3b9b7af5c2df8fa91f485fbb06712bd3f2e75546b5da0e186172c06a1bd2d53
-
SHA512
58136de78e9c3dcb4fd8c104b46e308df3970aa85023fb4fae429bf4ccddd6f6c28150ef13d0b2c54e7b7a4c95530dbe59f23aa03c689748c06945407dc88a2a
-
SSDEEP
6144:FloZM+rIkd8g+EtXHkv/iD4W5vt74szHKrd4UBJZnDKZ8e1m5i:HoZtL+EP8W5vt74szHKrd4UBbkz
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240729-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1279229402600964119/_qK0_T88QUe0alCWEzUblJWwOL8yy0h4Z_ryKAxRXB7oMKpv_9n8t40vPTOBvj-BCIlT
Targets
-
-
Target
Loader.exe
-
Size
229KB
-
MD5
8ec99595eb4b466b230b36944ec38d62
-
SHA1
bd7127e7b3b3bafc56699168c69099ea15897ee8
-
SHA256
f3b9b7af5c2df8fa91f485fbb06712bd3f2e75546b5da0e186172c06a1bd2d53
-
SHA512
58136de78e9c3dcb4fd8c104b46e308df3970aa85023fb4fae429bf4ccddd6f6c28150ef13d0b2c54e7b7a4c95530dbe59f23aa03c689748c06945407dc88a2a
-
SSDEEP
6144:FloZM+rIkd8g+EtXHkv/iD4W5vt74szHKrd4UBJZnDKZ8e1m5i:HoZtL+EP8W5vt74szHKrd4UBbkz
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1