General
-
Target
svchost.exe
-
Size
234KB
-
Sample
240918-sethtsxcmd
-
MD5
4de282f3a3d77c0b217fa45c09454d22
-
SHA1
bdf07d339f21217ae5acfcce83bcc04ac1037134
-
SHA256
e6d228a2a4610cb3d21b4cc965223f5f4c98e40263c71d0307e6dc4a693512ec
-
SHA512
2b58af8a8b1ed2328c100dc9f7665e26c08c3b586079f736255003f3a1a503d6ba97a4040168c5da4d6998d0d2ed81735b74d73958e9baeef361d97559c701fa
-
SSDEEP
6144:1rQHIw0YRt+1SHkekkngPBJW8e1mhNax:1QP+2nfC0x
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1285972781925798132/nBZqbxL73TFbSYajVgbmW6KAjmyusRbWfByPMvZHMnjHAVPOWVCXCxCsfk91nafH1Gby
Targets
-
-
Target
svchost.exe
-
Size
234KB
-
MD5
4de282f3a3d77c0b217fa45c09454d22
-
SHA1
bdf07d339f21217ae5acfcce83bcc04ac1037134
-
SHA256
e6d228a2a4610cb3d21b4cc965223f5f4c98e40263c71d0307e6dc4a693512ec
-
SHA512
2b58af8a8b1ed2328c100dc9f7665e26c08c3b586079f736255003f3a1a503d6ba97a4040168c5da4d6998d0d2ed81735b74d73958e9baeef361d97559c701fa
-
SSDEEP
6144:1rQHIw0YRt+1SHkekkngPBJW8e1mhNax:1QP+2nfC0x
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1