General
-
Target
Nursultan Alpha Crac.zip
-
Size
166KB
-
Sample
241115-q5d5qaymdr
-
MD5
a702e86bc5b2414cbd56640dd49ecd7e
-
SHA1
57667ea34b124f8c864e307d320935a08524e8cb
-
SHA256
f1893a01dfcf41766265f2f197163382e7237f2571f37cf0fd83aa990942b299
-
SHA512
7a7b8ca36ce180e549e9ed3502058cb52f3b62eca31f4d14bca0fc4ce5e2444d66c3c14c17ee3842bd7141d10ae9158b53e2ab88ba76e35a0f104fab0b16a1db
-
SSDEEP
3072:vcgjKXDllnPXeIzO7DR4Qm6iywGI4XygzXlYSGxQjDUjvkZxrb8m9:vlKruIzuq6hwGIK1PYAMm9
Behavioral task
behavioral1
Sample
Nursultan Alpha Crack.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1305215816312295496/rY0Dry8ZlCgHhtUlzGswN815TaT6KbXjX_IAdYGMNd3Mvdmq7PV9Lex48HUyMcaETyeK
Targets
-
-
Target
Nursultan Alpha Crack.exe
-
Size
494KB
-
MD5
e6884786b4fca76e3752225aa2f24abb
-
SHA1
a089d0818839ee52bcd0d8156fba1470c2f9ba3c
-
SHA256
fd0bdd761b727b568e5d9d572aabff62177c4208ce2d1b281d278379b856bf5a
-
SHA512
e41ea86252a735f8a03625ba79b65a3a790663a03d66f7f4c36ab8a94244944bcf75c6389e448ce962f523120dc8cb2787c2766f12e7e6667276a038209395e6
-
SSDEEP
12288:doZItlRk83MllBazCg/7IsR0STTKI7AY/rXi7Q:r5r3kazCg/7IsR0STTKI/rXiU
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1