General
-
Target
9665f625dacc3edc5a75c34d464359e0N
-
Size
231KB
-
Sample
240911-w4n67awapj
-
MD5
9665f625dacc3edc5a75c34d464359e0
-
SHA1
166a91b93c7a8de708ee4eebea7706085996c3f7
-
SHA256
e358e74aa9503094559d9c580d2c535c1e8f4ae202ba2afa0a4bc1c97509eb7d
-
SHA512
00698c46aa028ff1ce576684f9846391cdd9ea15e19ec724b3ffc6ffdf7c9d622e6d48d7c5dedfffa885c69f36023d8b95607c4ff3eca5b575f3940504b8c5e4
-
SSDEEP
6144:xloZMmrIkd8g+EtXHkv/iD4iAFMW0b3cnNImHHmxtb8e1m3Nri:DoZ1L+EP8iAFMW0b3cnNImHHm7n
Behavioral task
behavioral1
Sample
9665f625dacc3edc5a75c34d464359e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9665f625dacc3edc5a75c34d464359e0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1281300759257813084/TAtw9va6em7-ZqM6ACI6dzMxdFXgkd__1WPgtjIMD52XeMq5ufX0eo_Tb-lncTS3lDWo
Targets
-
-
Target
9665f625dacc3edc5a75c34d464359e0N
-
Size
231KB
-
MD5
9665f625dacc3edc5a75c34d464359e0
-
SHA1
166a91b93c7a8de708ee4eebea7706085996c3f7
-
SHA256
e358e74aa9503094559d9c580d2c535c1e8f4ae202ba2afa0a4bc1c97509eb7d
-
SHA512
00698c46aa028ff1ce576684f9846391cdd9ea15e19ec724b3ffc6ffdf7c9d622e6d48d7c5dedfffa885c69f36023d8b95607c4ff3eca5b575f3940504b8c5e4
-
SSDEEP
6144:xloZMmrIkd8g+EtXHkv/iD4iAFMW0b3cnNImHHmxtb8e1m3Nri:DoZ1L+EP8iAFMW0b3cnNImHHm7n
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-