General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
241027-1dfjksshld
-
MD5
f2b455f6e472b641d1ccc3f9c01cf429
-
SHA1
e31c726c4d8a5a786940cb513eb90a07f2a81ca8
-
SHA256
e899e164d7941ef537bd9e1b6ec3cce4853836cc0893df4ab18e291bba93099a
-
SHA512
460b49463f834562d5ecf567a992c2ff7c282eeb9d9524a2db809143561c35b6cf8a86fc474e15c6366196a5111656536bcb97c57b7a2d1320427b467cf66c52
-
SSDEEP
6144:FloZMKrIkd8g+EtXHkv/iD4BtDSdLocDxabtIExCgb8e1mk2i:HoZJL+EP8BtDSdLocDxabtIExLX7
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1292124140064608337/kC3TU34BcNXonIUE9I3g7boAXRaXWicDnCBjx6ez4OuvYOZAYUVkQfISJI8n5-ZpJnpL
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
f2b455f6e472b641d1ccc3f9c01cf429
-
SHA1
e31c726c4d8a5a786940cb513eb90a07f2a81ca8
-
SHA256
e899e164d7941ef537bd9e1b6ec3cce4853836cc0893df4ab18e291bba93099a
-
SHA512
460b49463f834562d5ecf567a992c2ff7c282eeb9d9524a2db809143561c35b6cf8a86fc474e15c6366196a5111656536bcb97c57b7a2d1320427b467cf66c52
-
SSDEEP
6144:FloZMKrIkd8g+EtXHkv/iD4BtDSdLocDxabtIExCgb8e1mk2i:HoZJL+EP8BtDSdLocDxabtIExLX7
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-