General
-
Target
1.exe
-
Size
231KB
-
Sample
240906-ay3xhaxcjd
-
MD5
55ede8f26c8c4e66cb0ce6f611d1cda9
-
SHA1
7afcbd679f67ccebfa2b187a864051c47dcff247
-
SHA256
85ec91cce58a9d18f5161164fa36f3c32ab4a133e331e30143026692824aae52
-
SHA512
6943227a873ed601fe2d81da7498b8a4323c525cead8a32ad35c9e51513cf50b99c2d0486e6da3463992db81b0cfdf280829cb4bb59e32c2ad32e1c3cd58a77b
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4wuqmn9GuBV0dP6aPKEb8e1m5Mi:joZtL+EP8wuqmn9GuBV0dP6aPTKF
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1281076930648608779/WTPCLKlUSsVyAb4kF16YFHDUj8d6tGfYo49bnQyv4nB9OiF8PqMnkR_ia-uPDoNoD4ZG
Targets
-
-
Target
1.exe
-
Size
231KB
-
MD5
55ede8f26c8c4e66cb0ce6f611d1cda9
-
SHA1
7afcbd679f67ccebfa2b187a864051c47dcff247
-
SHA256
85ec91cce58a9d18f5161164fa36f3c32ab4a133e331e30143026692824aae52
-
SHA512
6943227a873ed601fe2d81da7498b8a4323c525cead8a32ad35c9e51513cf50b99c2d0486e6da3463992db81b0cfdf280829cb4bb59e32c2ad32e1c3cd58a77b
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4wuqmn9GuBV0dP6aPKEb8e1m5Mi:joZtL+EP8wuqmn9GuBV0dP6aPTKF
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1