General
-
Target
Nitro Tools.rar
-
Size
82KB
-
Sample
240905-sv9jzsthrd
-
MD5
7460868214131fe4bc500c47c5f4b2fd
-
SHA1
b3e620e61b573737e26eafc0b42588227802722d
-
SHA256
4adaffe46ccae1425c54b81f87fcb56b7f66760b5d5f0ae3328e72c934bbb3c8
-
SHA512
3c2f5f4af969997b8939222daa16010435e97e57da110b64a61e13bc3d8d32d54bed31478bc0fbec8479c143b1d4234b43c9d8814c473b5e29f95c690cccc94e
-
SSDEEP
1536:WQ5EgwfR8sOVflllq9yZvBX1xKjFogPrU+b2zajL:WQ5NwmHVflllq9yHFxKjnTU42z+
Behavioral task
behavioral1
Sample
Nitro Tools.exe
Resource
win7-20240729-en
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1281243540256591944/Hvm3cR-qlME8rmsZEzAd9Bcccgxn-2QEXALCjrbq5rrzjv2Aw7afNK5Xd_8l5UgqnCuL
Targets
-
-
Target
Nitro Tools.exe
-
Size
231KB
-
MD5
eb9bfe2cafae0e84d30f9e214ec4a6aa
-
SHA1
fabd92cb405e06b720a88d0077b124fb97577208
-
SHA256
e88819618a14114c00385b9729bd83567ab21a5547baa8923477bd2c54434369
-
SHA512
8358eddbb14c88a5ff8859a1c0339f7d0380c8a91510b5daa0e6a3a6dcd15b3967496caef46d10e5f1ba6e7d60c65077022815fa16fc7f0fc542b17007e2a0fa
-
SSDEEP
6144:RloZM3fsXtioRkts/cnnK6cMl1l0W6YXzQgp8aLLyJcS8e1mKLi:joZ1tlRk83Ml1l0W6YXzQgp8aLLy5rG
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1