General
-
Target
v-rise.exe
-
Size
231KB
-
Sample
241120-1mcjaavcqj
-
MD5
96733f1c7335e4feb3df5510e7ff3381
-
SHA1
13610a36de1096cbd27029cf045db560c0a11a00
-
SHA256
2beabdeb546ede6ad3e196c42c64d2a6733bc81de2574398b3c2b46668aecf1c
-
SHA512
590d1d2d21154c3e08edae598b702849eb3f93d5c08cf772a1215595f269c4123599ee010ba5a257bdc0a07455e68db92a49542903acf791fedff1d623b6eecb
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD48tzFw2xpaNPyAxVkYRb8e1mjXi:joZtL+EP88tzFw2xpaNPyAxVk0Uy
Behavioral task
behavioral1
Sample
v-rise.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1306714080786124932/6sEiVvrOdbnLDQsYjvdDac-Of6XLBKvSR6lSPhBDMe5gbr0HBrbFzjy0XVETwUYMFaCY
Targets
-
-
Target
v-rise.exe
-
Size
231KB
-
MD5
96733f1c7335e4feb3df5510e7ff3381
-
SHA1
13610a36de1096cbd27029cf045db560c0a11a00
-
SHA256
2beabdeb546ede6ad3e196c42c64d2a6733bc81de2574398b3c2b46668aecf1c
-
SHA512
590d1d2d21154c3e08edae598b702849eb3f93d5c08cf772a1215595f269c4123599ee010ba5a257bdc0a07455e68db92a49542903acf791fedff1d623b6eecb
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD48tzFw2xpaNPyAxVkYRb8e1mjXi:joZtL+EP88tzFw2xpaNPyAxVk0Uy
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1