General
-
Target
Loader.bat
-
Size
1KB
-
Sample
241125-pwf3aaxjct
-
MD5
84d66a793f6d1f8fb1f4726ee735f55e
-
SHA1
db7f145a9685a3911f02bbc61a02546da06e68d9
-
SHA256
504e74f223f13c996066449c7f279eb32a61f80f80c9e87d31cfdca6fee7373f
-
SHA512
ab172682c693815c9bb902f395632785e0b24981f05eef61244c4311aabb79f94a4af9e1dc978ab2f3caa5b4db1b5cdd2ad896a61d4d8bb747750d702f1b907e
Static task
static1
Behavioral task
behavioral1
Sample
Loader.bat
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
Default
technical-southwest.gl.at.ply.gg:58694
-
delay
1
-
install
true
-
install_file
WINDOWS.exe
-
install_folder
%AppData%
Extracted
umbral
https://discordapp.com/api/webhooks/1310580388070031360/HcT5cAwFckSLk1OKu346uVDw7gzPyJJvcWmU8BKJrBQSUsE3Q1GCqDtVn5MK3JlldJBn
Targets
-
-
Target
Loader.bat
-
Size
1KB
-
MD5
84d66a793f6d1f8fb1f4726ee735f55e
-
SHA1
db7f145a9685a3911f02bbc61a02546da06e68d9
-
SHA256
504e74f223f13c996066449c7f279eb32a61f80f80c9e87d31cfdca6fee7373f
-
SHA512
ab172682c693815c9bb902f395632785e0b24981f05eef61244c4311aabb79f94a4af9e1dc978ab2f3caa5b4db1b5cdd2ad896a61d4d8bb747750d702f1b907e
-
Asyncrat family
-
Detect Umbral payload
-
Umbral family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1