General
-
Target
discord.png.exe
-
Size
225KB
-
Sample
240902-t64njstgjp
-
MD5
44041b93332122228c15d8fd2fdc826d
-
SHA1
47069ad7151444f7412036952272405000d0e3f9
-
SHA256
9c71bd0581840574d1ea5919284bbb89e6e19f883bf8ffc4b50c03aea223067e
-
SHA512
e109c3d7fbd6fc892ae28fe66092dcf5723de577eefb6a363cd571e422b7ce23e54b4f2ba1988b792f7abc8cac83981b1311f16b2a8c7f95081d654c03ce1f7f
-
SSDEEP
3072:WeEDoF+/dwv+J5evFqmHNNhmqOOR81MK1vHM/2M:WoFzvGeNqcNNs9L1vHM/
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1279958073611653151/sgCCzoTAUY2GdBiQCHyal38EkTL7KHY4qK_JXgYBYU5QznfI7jIvFFaW3IHI9Y8dsDm8
Targets
-
-
Target
discord.png.exe
-
Size
225KB
-
MD5
44041b93332122228c15d8fd2fdc826d
-
SHA1
47069ad7151444f7412036952272405000d0e3f9
-
SHA256
9c71bd0581840574d1ea5919284bbb89e6e19f883bf8ffc4b50c03aea223067e
-
SHA512
e109c3d7fbd6fc892ae28fe66092dcf5723de577eefb6a363cd571e422b7ce23e54b4f2ba1988b792f7abc8cac83981b1311f16b2a8c7f95081d654c03ce1f7f
-
SSDEEP
3072:WeEDoF+/dwv+J5evFqmHNNhmqOOR81MK1vHM/2M:WoFzvGeNqcNNs9L1vHM/
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1