General
-
Target
69f81a0239ba12507c8e9aec8e3d1667d230d38daadf50039b7968b2ca5e1b49N.exe
-
Size
229KB
-
Sample
241126-2pw65sznfq
-
MD5
cbbf1ff408089c98de723a2bd5720e50
-
SHA1
a186fb0e8cb8ce8c65c473a07a42b9abd29d699d
-
SHA256
69f81a0239ba12507c8e9aec8e3d1667d230d38daadf50039b7968b2ca5e1b49
-
SHA512
92f1df204fd200685a90de370437c255520e33c66dd7e6e667985c14b99ea449d69709591102db0ae91fd35fef70a13c6dea02c3d5a4417b891befc60816f1ec
-
SSDEEP
6144:9loZM+rIkd8g+EtXHkv/iD4giX9UgGhZq+fiQBFUuQb8e1mLucSUi:foZtL+EP8gI9UgGhZq+fiQBFUT33d
Behavioral task
behavioral1
Sample
69f81a0239ba12507c8e9aec8e3d1667d230d38daadf50039b7968b2ca5e1b49N.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1300923716687106088/zBYqs8nJ3MptGRgCn45okL0BWnQ0FdPIXStaaykk5DhZfBnHinW4M0Ve6U2CSPsMATf2
Targets
-
-
Target
69f81a0239ba12507c8e9aec8e3d1667d230d38daadf50039b7968b2ca5e1b49N.exe
-
Size
229KB
-
MD5
cbbf1ff408089c98de723a2bd5720e50
-
SHA1
a186fb0e8cb8ce8c65c473a07a42b9abd29d699d
-
SHA256
69f81a0239ba12507c8e9aec8e3d1667d230d38daadf50039b7968b2ca5e1b49
-
SHA512
92f1df204fd200685a90de370437c255520e33c66dd7e6e667985c14b99ea449d69709591102db0ae91fd35fef70a13c6dea02c3d5a4417b891befc60816f1ec
-
SSDEEP
6144:9loZM+rIkd8g+EtXHkv/iD4giX9UgGhZq+fiQBFUuQb8e1mLucSUi:foZtL+EP8gI9UgGhZq+fiQBFUT33d
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1