General
-
Target
8fb16a6820997425bafc7635fe37436801301ca8dc445f57db97dd264c5ccf0b.exe
-
Size
227KB
-
Sample
241116-bv46tsxdkl
-
MD5
3a1c193849903781020935a8ad07d07a
-
SHA1
fef92d8486cebb4d974df2faf04ae37bb0320d6f
-
SHA256
8fb16a6820997425bafc7635fe37436801301ca8dc445f57db97dd264c5ccf0b
-
SHA512
6f5188d12915c449b7e61842e044573b1b4f2557bbab8f6c71c1e06cccaa04a313af2db0f074a59a8a25919b2b12367635a479a65fd57d3b66d5ff15b4d72246
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4tqjy0ad1+47mEl5Q8hb8e1mcgi9:ooZtL+EP8tqjy0ad1+47mEl5QkL59
Behavioral task
behavioral1
Sample
8fb16a6820997425bafc7635fe37436801301ca8dc445f57db97dd264c5ccf0b.exe
Resource
win7-20240729-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1305582300918185994/EE8PFtpBm_iHizpV_Q_Kn5DP9px4rFVu_tjpCIZQ5EdlmytBIKpakzf4xxE22pXS9U1K
Targets
-
-
Target
8fb16a6820997425bafc7635fe37436801301ca8dc445f57db97dd264c5ccf0b.exe
-
Size
227KB
-
MD5
3a1c193849903781020935a8ad07d07a
-
SHA1
fef92d8486cebb4d974df2faf04ae37bb0320d6f
-
SHA256
8fb16a6820997425bafc7635fe37436801301ca8dc445f57db97dd264c5ccf0b
-
SHA512
6f5188d12915c449b7e61842e044573b1b4f2557bbab8f6c71c1e06cccaa04a313af2db0f074a59a8a25919b2b12367635a479a65fd57d3b66d5ff15b4d72246
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4tqjy0ad1+47mEl5Q8hb8e1mcgi9:ooZtL+EP8tqjy0ad1+47mEl5QkL59
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1