General
-
Target
nitrosnipr.exe
-
Size
229KB
-
Sample
240914-ccskra1hja
-
MD5
0dcc2299f5e6a41c04593b9e1d8fb825
-
SHA1
6d5b2580da6616d958f721c82241b52821dac5a1
-
SHA256
a820aa027bed73820a45f380eb8858bc6c24dcce2ed9bc2bfdc4b7ecc54ba7e7
-
SHA512
f6553276f07988aae7a7232c3f98447a7883f1b87c1a85955909e7374d8cd4bd08b923395283c0115d5cb123f287f3938d02c2700ccd264ae78f9f771df35920
-
SSDEEP
6144:tloZM+rIkd8g+EtXHkv/iD40H9txd58e1mUtbi:voZtL+EP8MHxDnM
Behavioral task
behavioral1
Sample
nitrosnipr.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1284331415886102568/N2tf6_mTq84gsH53FdCWJR8H0Xf-6qvm8lG0GmsORl9dLRkzSObvd00piUvVBlEj6_6d
Targets
-
-
Target
nitrosnipr.exe
-
Size
229KB
-
MD5
0dcc2299f5e6a41c04593b9e1d8fb825
-
SHA1
6d5b2580da6616d958f721c82241b52821dac5a1
-
SHA256
a820aa027bed73820a45f380eb8858bc6c24dcce2ed9bc2bfdc4b7ecc54ba7e7
-
SHA512
f6553276f07988aae7a7232c3f98447a7883f1b87c1a85955909e7374d8cd4bd08b923395283c0115d5cb123f287f3938d02c2700ccd264ae78f9f771df35920
-
SSDEEP
6144:tloZM+rIkd8g+EtXHkv/iD40H9txd58e1mUtbi:voZtL+EP8MHxDnM
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1