General
-
Target
WindowstDriverAutoUpdater_X64.exe
-
Size
2.5MB
-
Sample
241030-jz1yzaxrdx
-
MD5
6f4f8578849ae9ac04f1038f12bc6ba5
-
SHA1
abac0aa5afca58e47d26139ebb3b50a64b62890c
-
SHA256
01e0a6ee3525d712d3d56b708914bbe5910cc2cdc3970f82d4afbac413f6142e
-
SHA512
9bc144713f3179cc3fbcf7531d54d77c714449b5dad1e7c9ab069a5fc14a38e360cc3c93b70018873c2da0221ddad6af3caebb8d1905e322a40d3c9693e1d25e
-
SSDEEP
49152:gdyk9hBIBRCpIfYU697Dmz9R6YZBbxPFii8QrPL4mgekYllV:gb9hBIBopzUsDcnBtFii8QT0mxlb
Static task
static1
Malware Config
Targets
-
-
Target
WindowstDriverAutoUpdater_X64.exe
-
Size
2.5MB
-
MD5
6f4f8578849ae9ac04f1038f12bc6ba5
-
SHA1
abac0aa5afca58e47d26139ebb3b50a64b62890c
-
SHA256
01e0a6ee3525d712d3d56b708914bbe5910cc2cdc3970f82d4afbac413f6142e
-
SHA512
9bc144713f3179cc3fbcf7531d54d77c714449b5dad1e7c9ab069a5fc14a38e360cc3c93b70018873c2da0221ddad6af3caebb8d1905e322a40d3c9693e1d25e
-
SSDEEP
49152:gdyk9hBIBRCpIfYU697Dmz9R6YZBbxPFii8QrPL4mgekYllV:gb9hBIBopzUsDcnBtFii8QT0mxlb
-
Detect Umbral payload
-
Umbral family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-