General
-
Target
Isolence.exe
-
Size
402KB
-
Sample
240922-vd64mszekr
-
MD5
87e7cabc378978827ad35f11a7e3d311
-
SHA1
eebf169bc83f6809229a8e2bd7925f99c216842f
-
SHA256
441d5ad14a8d62643e2fe09046f6afe5b04b045c89dc3b213fcb695d5faa0063
-
SHA512
2893da6232254d14d8038529e636f8178ef0b2143f640e6655de9186635b545d19713c843409840f8a1807adfe9ef10c344a42d448c9d71663f988d29467f039
-
SSDEEP
6144:Vqg1BFe479zdJQxMh1PLm1Puu24ZmlLKSCbOymoeFKJCTownhl4K/X:Vx247OGQ3Z+WS2eVPnv4Kv
Static task
static1
Behavioral task
behavioral1
Sample
Isolence.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Isolence.exe
-
Size
402KB
-
MD5
87e7cabc378978827ad35f11a7e3d311
-
SHA1
eebf169bc83f6809229a8e2bd7925f99c216842f
-
SHA256
441d5ad14a8d62643e2fe09046f6afe5b04b045c89dc3b213fcb695d5faa0063
-
SHA512
2893da6232254d14d8038529e636f8178ef0b2143f640e6655de9186635b545d19713c843409840f8a1807adfe9ef10c344a42d448c9d71663f988d29467f039
-
SSDEEP
6144:Vqg1BFe479zdJQxMh1PLm1Puu24ZmlLKSCbOymoeFKJCTownhl4K/X:Vx247OGQ3Z+WS2eVPnv4Kv
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1