General
-
Target
8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874
-
Size
229KB
-
Sample
240920-z8lhmsyfrk
-
MD5
25a2fec95cda41fd3c61d60c94ff3364
-
SHA1
beaf7f2cac9263de452edd2acf988c7ee80a3b1b
-
SHA256
8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874
-
SHA512
30da5918a3afd72ec6f5ff5fb70f4d7c0a4d424f12b1fa1be9453bb8ee8df0cdc89aa05d6202d8392032f2f6e47b2c43ea36e024b0def49ed829bfe10ff2d830
-
SSDEEP
6144:9loZMjNaK9/gMntXP03fCFZ4HZMs1tGRPAA/NotgKv8eFlLBT:foZwd5n734HZMs1tGRPAA/NpWlZ
Behavioral task
behavioral1
Sample
8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1285678240769245204/Dq6zV8vBVQwMR8PmcuFAplSv7V5Q4av4gvUflUzlpEaaJSOpw9baWNsnjhiJwoEYkK78
Targets
-
-
Target
8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874
-
Size
229KB
-
MD5
25a2fec95cda41fd3c61d60c94ff3364
-
SHA1
beaf7f2cac9263de452edd2acf988c7ee80a3b1b
-
SHA256
8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874
-
SHA512
30da5918a3afd72ec6f5ff5fb70f4d7c0a4d424f12b1fa1be9453bb8ee8df0cdc89aa05d6202d8392032f2f6e47b2c43ea36e024b0def49ed829bfe10ff2d830
-
SSDEEP
6144:9loZMjNaK9/gMntXP03fCFZ4HZMs1tGRPAA/NotgKv8eFlLBT:foZwd5n734HZMs1tGRPAA/NpWlZ
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-