General
-
Target
cybersec multitool.exe
-
Size
631KB
-
Sample
241128-cq6drsxjhl
-
MD5
8b2224504b56a273fcb096f266c8946e
-
SHA1
d25adb8c1e4370e4e5de7e69eead5737404e9401
-
SHA256
6b5a764726812a78d0f0cfff4921f2c15c47f7cc265cb7dd9f293aa4728a1c19
-
SHA512
1d3fe9628dd39b4d94fe8e6ed5e58576337a7a94effce38530530c695fb25fbe4e8a3c62efc73d0511a3daa8966afec7d559a50c48483451e68d04cbc9229479
-
SSDEEP
12288:5oZtL+EP8YOkSt74szYKrd4UBnvmiMdRC:XI8vkSt74szYKrd4UBn+iMdA
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1311512162442674258/KZ7Yf6xtuzDgeDzhbkhFHunjKft3Vjq7gk__oOyCg4FN2mQmI4IlBQeKzeh515-W6ojX
Targets
-
-
Target
cybersec multitool.exe
-
Size
631KB
-
MD5
8b2224504b56a273fcb096f266c8946e
-
SHA1
d25adb8c1e4370e4e5de7e69eead5737404e9401
-
SHA256
6b5a764726812a78d0f0cfff4921f2c15c47f7cc265cb7dd9f293aa4728a1c19
-
SHA512
1d3fe9628dd39b4d94fe8e6ed5e58576337a7a94effce38530530c695fb25fbe4e8a3c62efc73d0511a3daa8966afec7d559a50c48483451e68d04cbc9229479
-
SSDEEP
12288:5oZtL+EP8YOkSt74szYKrd4UBnvmiMdRC:XI8vkSt74szYKrd4UBn+iMdA
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1