General
-
Target
upx.exe
-
Size
231KB
-
Sample
240920-mjrxxasbpq
-
MD5
88b64c5cad0453a14347d415f9d4f82b
-
SHA1
4a613e651418497885bf4861dc27fee379eee1b9
-
SHA256
f7f74aeaf94b242f73f0417796f4814c1a857eaa246ebcb7a667643d90af938e
-
SHA512
56775a3ce0c99998c0354a5d7485fbaf01e83f247412849abd2d81461decf0e9c4fa095d43e18be74fe7225df2b6cbbc2f98f4abf5611192ef66d83abee2d7d2
-
SSDEEP
6144:bloZM+rIkd8g+EtXHkv/iD4irHJzZqStHY5rWWDIPb8e1m4i:5oZtL+EP8irHJzZqStHY5rWWD2y
Behavioral task
behavioral1
Sample
upx.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1286410156086657135/y7TF20aVqx76GuDRgjns3cJ12jus9sZ45Frb_eNyqMyI_5W9_y_ZNBROkZh10eJnySEN
Targets
-
-
Target
upx.exe
-
Size
231KB
-
MD5
88b64c5cad0453a14347d415f9d4f82b
-
SHA1
4a613e651418497885bf4861dc27fee379eee1b9
-
SHA256
f7f74aeaf94b242f73f0417796f4814c1a857eaa246ebcb7a667643d90af938e
-
SHA512
56775a3ce0c99998c0354a5d7485fbaf01e83f247412849abd2d81461decf0e9c4fa095d43e18be74fe7225df2b6cbbc2f98f4abf5611192ef66d83abee2d7d2
-
SSDEEP
6144:bloZM+rIkd8g+EtXHkv/iD4irHJzZqStHY5rWWDIPb8e1m4i:5oZtL+EP8irHJzZqStHY5rWWD2y
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1