General
-
Target
Patcher.bin
-
Size
292KB
-
Sample
240909-j3cesaydqn
-
MD5
40e407453b653751e0f3b6237500c362
-
SHA1
70c4819f3df236d816f01e884b88c683c87de8a7
-
SHA256
42441a6e6eefa60a69c49cc280d1faafa48e0a3bc8e6787c3248a0c610c48c64
-
SHA512
8298c7ef17583af41230b9a8a2d8cb69033f97a6a5ea19804f40e7d95c22af12feaef3b3a8f609320f72a85d323127aea6bdb8d493303ffd9c31bf14998737bb
-
SSDEEP
6144:zloZMArIkd8g+EtXHkv/iD4Na1Q2AmB5K7/Cwhl0fjb8e1moirBcG95S:xoZHL+EP8Na1Q2AmB5K7/Cwhl0/arxK
Behavioral task
behavioral1
Sample
Patcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Patcher.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1281893760577568769/TeDYCewV4yykoreFUt-0f8MZ_-AtXL0RMIoTai6ZqBGOZso9yh5UUSvyS8y4M_zyk6aB
Targets
-
-
Target
Patcher.bin
-
Size
292KB
-
MD5
40e407453b653751e0f3b6237500c362
-
SHA1
70c4819f3df236d816f01e884b88c683c87de8a7
-
SHA256
42441a6e6eefa60a69c49cc280d1faafa48e0a3bc8e6787c3248a0c610c48c64
-
SHA512
8298c7ef17583af41230b9a8a2d8cb69033f97a6a5ea19804f40e7d95c22af12feaef3b3a8f609320f72a85d323127aea6bdb8d493303ffd9c31bf14998737bb
-
SSDEEP
6144:zloZMArIkd8g+EtXHkv/iD4Na1Q2AmB5K7/Cwhl0fjb8e1moirBcG95S:xoZHL+EP8Na1Q2AmB5K7/Cwhl0/arxK
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-