General
-
Target
test.exe
-
Size
360KB
-
Sample
240915-as792awarq
-
MD5
d16b4139ed4406bce80daf7f64ea7f76
-
SHA1
d1380cc067fe320dc16e43ac31208e2ce0d7fd5c
-
SHA256
44806f5e8beab048f45916e5723a475bd20f2684929ec4cc92b1096168a4e32f
-
SHA512
cee8211366528d5c5bb821a2c6c53f445b43659e43734ce9cb16a368dcd2d28d5e909c5e489482625ef73daa7b387d939829089c69961b3291a7e741b29a0fa6
-
SSDEEP
6144:1loZM+rIkd8g+EtXHkv/iD4p9d0mkrHMp9YW3X2B0b8e1mLieq:XoZtL+EP8p9d0mkrHMp9YW3X2iVeq
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1284669235687198743/YM3nJjFx4CJ-kn46QCwSQbLnGTqePDB1Xn00-cOyln-4FF_bnfPT7KWZpGAk6b6xR8CE
Targets
-
-
Target
test.exe
-
Size
360KB
-
MD5
d16b4139ed4406bce80daf7f64ea7f76
-
SHA1
d1380cc067fe320dc16e43ac31208e2ce0d7fd5c
-
SHA256
44806f5e8beab048f45916e5723a475bd20f2684929ec4cc92b1096168a4e32f
-
SHA512
cee8211366528d5c5bb821a2c6c53f445b43659e43734ce9cb16a368dcd2d28d5e909c5e489482625ef73daa7b387d939829089c69961b3291a7e741b29a0fa6
-
SSDEEP
6144:1loZM+rIkd8g+EtXHkv/iD4p9d0mkrHMp9YW3X2B0b8e1mLieq:XoZtL+EP8p9d0mkrHMp9YW3X2iVeq
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1