General
-
Target
6e44577b67a2078fb7f6fd18aabdd9e03cc1a5ff3b2549ac4c1172171e9b5548N
-
Size
231KB
-
Sample
240917-1tachaxcmp
-
MD5
bf88437e7f3d92105674eb1d1898ad60
-
SHA1
b05bac32adf9ac7e6d43ea6125e3990d8eab252a
-
SHA256
6e44577b67a2078fb7f6fd18aabdd9e03cc1a5ff3b2549ac4c1172171e9b5548
-
SHA512
8b97ec767712e8a2e88c22c9ead351a17c21b2b6714b65d440bd9d3555601b7055209ad6dca70d5c4c06425a67dcfba15d6cc6c773d26ee0997c911dc29f212f
-
SSDEEP
6144:RloZMJrIkd8g+EtXHkv/iD4vqU5EKtFunr20VJggTI8e1mEi:joZCL+EP8vqU5EKtFunr20VJgH6
Behavioral task
behavioral1
Sample
6e44577b67a2078fb7f6fd18aabdd9e03cc1a5ff3b2549ac4c1172171e9b5548N.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1283405546807890005/H711uAHISarSH3qsZH2T1W2fX4fmNrhTB3YHn4DzTDrt0_GiXJlts2WXBq2ZAo3ZuwLr
Targets
-
-
Target
6e44577b67a2078fb7f6fd18aabdd9e03cc1a5ff3b2549ac4c1172171e9b5548N
-
Size
231KB
-
MD5
bf88437e7f3d92105674eb1d1898ad60
-
SHA1
b05bac32adf9ac7e6d43ea6125e3990d8eab252a
-
SHA256
6e44577b67a2078fb7f6fd18aabdd9e03cc1a5ff3b2549ac4c1172171e9b5548
-
SHA512
8b97ec767712e8a2e88c22c9ead351a17c21b2b6714b65d440bd9d3555601b7055209ad6dca70d5c4c06425a67dcfba15d6cc6c773d26ee0997c911dc29f212f
-
SSDEEP
6144:RloZMJrIkd8g+EtXHkv/iD4vqU5EKtFunr20VJggTI8e1mEi:joZCL+EP8vqU5EKtFunr20VJgH6
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1