General
-
Target
visa generator.exe
-
Size
254KB
-
Sample
241010-tcn11ayfqr
-
MD5
711225a87b2c2069b3f29d97856b6462
-
SHA1
cb2a915c50090e03ea93ac92c7957a789ffda322
-
SHA256
860eed7c10b5d0fff8a8b88cfd7de7cdd74d571bad64833af199d827af4e377d
-
SHA512
8da2cd7faa1676986bf8b103738dcf82079f29f313cbe5da61620b20232e5aa161893229ee9511827df68a500733f34dcb737d681e92ac5e5bb7cfcd1faed82a
-
SSDEEP
6144:K4oZo0eVHPtHgTIAaZgCwDx7axHU0unC28ejI8n7:xoZWHPvWCwjXCsIq
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1289653062121685093/c26zRFNhesf1AIN0ZAe787Ex1TnQKaGtY_KNXOuxi3k38YF1pZcXhj93ArG7bVHDT-6e
Targets
-
-
Target
visa generator.exe
-
Size
254KB
-
MD5
711225a87b2c2069b3f29d97856b6462
-
SHA1
cb2a915c50090e03ea93ac92c7957a789ffda322
-
SHA256
860eed7c10b5d0fff8a8b88cfd7de7cdd74d571bad64833af199d827af4e377d
-
SHA512
8da2cd7faa1676986bf8b103738dcf82079f29f313cbe5da61620b20232e5aa161893229ee9511827df68a500733f34dcb737d681e92ac5e5bb7cfcd1faed82a
-
SSDEEP
6144:K4oZo0eVHPtHgTIAaZgCwDx7axHU0unC28ejI8n7:xoZWHPvWCwjXCsIq
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-