General
-
Target
Eval.gg.exe
-
Size
231KB
-
Sample
240911-3xeshazfpl
-
MD5
28aa75839a6f5f64e82139f18dd6331b
-
SHA1
511fd8d498f9c4e333aa7397ed0f8e26ac7ba159
-
SHA256
c4943ea4fbfe0cb85961446f99020cd60789b1557f73adb5b5f66b25e936ce69
-
SHA512
2259e8c91ef2e1a5cd56c77ebe9f8fa6a2071671d9c5447a45e1381abb8498745a63b781510cba1d5de258404a601b5a2742bb4cb6cf3cc69a3c5453cb470564
-
SSDEEP
6144:hloZM+rIkd8g+EtXHkv/iD4tx/GEKtFuxr20VJgBlb8e1m/3i:ToZtL+EP8tx/GEKtFuxr20VJgzYS
Behavioral task
behavioral1
Sample
Eval.gg.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1283560097590542368/p3Bpyu3RP4hOB9HE7uZFW3RadScsxcJNQOC60HNfQx2Rpx_4r4atEvIKpOvtUIrJsDaW
Targets
-
-
Target
Eval.gg.exe
-
Size
231KB
-
MD5
28aa75839a6f5f64e82139f18dd6331b
-
SHA1
511fd8d498f9c4e333aa7397ed0f8e26ac7ba159
-
SHA256
c4943ea4fbfe0cb85961446f99020cd60789b1557f73adb5b5f66b25e936ce69
-
SHA512
2259e8c91ef2e1a5cd56c77ebe9f8fa6a2071671d9c5447a45e1381abb8498745a63b781510cba1d5de258404a601b5a2742bb4cb6cf3cc69a3c5453cb470564
-
SSDEEP
6144:hloZM+rIkd8g+EtXHkv/iD4tx/GEKtFuxr20VJgBlb8e1m/3i:ToZtL+EP8tx/GEKtFuxr20VJgzYS
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1