General
-
Target
explorer (1)
-
Size
1.3MB
-
Sample
240916-wzbejasfjb
-
MD5
575b9fa5e916d6e0fe48003127c0e7b3
-
SHA1
ea732f7fcd8e0f20f8c66c8a0ab20880851c2f6e
-
SHA256
e45dc08a9c9c96afdcbb33dc108417df2ec52ccb0bb1f776bc83770c70ef4739
-
SHA512
3f337262446aad13ad05589f170149b916692ef4dffd1f005029dcbd01a6e703442d19678641501d466df9f3e264ed946ee39290141fc470ba545725d8fd3f14
-
SSDEEP
24576:StvMlasKkTqxNx5V27DeEhP959IY9noqx78BXO/1byJRT:0gep23b9IUoqxT/1byJ
Static task
static1
Behavioral task
behavioral1
Sample
explorer (1).exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom
Targets
-
-
Target
explorer (1)
-
Size
1.3MB
-
MD5
575b9fa5e916d6e0fe48003127c0e7b3
-
SHA1
ea732f7fcd8e0f20f8c66c8a0ab20880851c2f6e
-
SHA256
e45dc08a9c9c96afdcbb33dc108417df2ec52ccb0bb1f776bc83770c70ef4739
-
SHA512
3f337262446aad13ad05589f170149b916692ef4dffd1f005029dcbd01a6e703442d19678641501d466df9f3e264ed946ee39290141fc470ba545725d8fd3f14
-
SSDEEP
24576:StvMlasKkTqxNx5V27DeEhP959IY9noqx78BXO/1byJRT:0gep23b9IUoqxT/1byJ
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1