General
-
Target
CS2Cheat (123).zip
-
Size
5.7MB
-
Sample
241028-hq5p5atdmr
-
MD5
148098afaadc07fd0b8b0d14d9b5d9d4
-
SHA1
7eaca8c4c1e35da1357c547145346037eb037062
-
SHA256
a9b604c34a849e743d65ee178e52090824b6220b806db53c50df8901e1fc7658
-
SHA512
4c491680a6a39324187e8d5f6542ecd36ec00ac0727361f10e6008f90fd2ed9b8af5d11cd289f1004b7cc216e74b01374feb49c61e184378084a6ed6fe4678b5
-
SSDEEP
98304:4ljVhV4b0V4wMGWscapVlwIinJE2rUPrwZDY9B2BCVZWG25kvNdBTvL10mVqDPw:YhVTFppV8JdUcZM9B2B9EVdBbL1HqDo
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1299080733079375894/hrEkdZRiNfD_2CydV4FCra9Yr1O879zBhe-K5U4ievQAChYclaabDINuCDCfyjlfFnOg
Targets
-
-
Target
CS2Cheat.exe
-
Size
5.7MB
-
MD5
920f3ec2a3fe3557e067f5cef16235f8
-
SHA1
30a82dc93b0d235d618f44a94bcd092791821912
-
SHA256
bd0976acd920ba7eedaad30f8834062856da10b46bf6c8ad9312fb3fdacddb8e
-
SHA512
0fc2e8ee35c4e56efc1bfded2803474881b3b29d4b01c80a600aff36a002a63108fa6e200100e0e1866ce58fd3040188949f00968802430d4e9f9e5c1eced681
-
SSDEEP
98304:SBfkDxFCuc+TThUj1lmFHKDWKkcdwYCQ0HGrDfEWOGa5YZUI692IWOgCheFezwjz:SRkzbc+vOjzpW27CzED8WiAV6Il8eZjz
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1