General
-
Target
f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a
-
Size
6.6MB
-
Sample
240904-m7ex9azfkd
-
MD5
ddb357ac119ef185255a40c89c7f4036
-
SHA1
75bfbe9ff027e7fa1b238171106c8fcdac57961d
-
SHA256
f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a
-
SHA512
8338ed0f88b27ca8db7c2eb563f9173dc8b326de72cfedb99dc6c600658fbbbb817db75dc79a4fc509f58b236fe61d2ed7c54ce1dd173dcb53c8143ab19ab617
-
SSDEEP
196608:c3/TNvcXXG6dW0scvNrkSTgB3/RVpXDSJ2cg:gpvcXXGJjclrk53fZSJ2cg
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1252680582354440374/YGnLESbYL-e0ySkeD-oZgw7qzQ6zGILUAto-79q0yWCLmXmZafvQ_AzE_o77RbZbKplc
Targets
-
-
Target
f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a
-
Size
6.6MB
-
MD5
ddb357ac119ef185255a40c89c7f4036
-
SHA1
75bfbe9ff027e7fa1b238171106c8fcdac57961d
-
SHA256
f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a
-
SHA512
8338ed0f88b27ca8db7c2eb563f9173dc8b326de72cfedb99dc6c600658fbbbb817db75dc79a4fc509f58b236fe61d2ed7c54ce1dd173dcb53c8143ab19ab617
-
SSDEEP
196608:c3/TNvcXXG6dW0scvNrkSTgB3/RVpXDSJ2cg:gpvcXXGJjclrk53fZSJ2cg
-
Detect Umbral payload
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1