General
-
Target
osintool.exe
-
Size
632KB
-
Sample
241130-e38qrssmc1
-
MD5
20181934a508ec23e7c2223be3c58e3b
-
SHA1
a29f3f89d10ff05f4589466bc11a2fd45016e0e5
-
SHA256
28fda1422979b63fd9b489a76cf5e43e68aa095eae547e96f050550b37208cab
-
SHA512
8f0a1dfa0e627d7779754cd045dc9dcaedbcb332870962706a9bbcc69d9383c8166c940844047ba4a85e3209f5bf0d284f7e84e67345347f8f2c21d93ef043f7
-
SSDEEP
12288:hoZtL+EP8shN9rI8jS67NokRq8zNiMdRC:fI8iN9rI8jS67NokRlBiMdA
Behavioral task
behavioral1
Sample
osintool.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1312264598925344790/QIlCbExze1iw_e1zkeZ792QOLaj8nGWIjrO_7fuXi-iXKjKnWrqwQcXcL_p5RK0UxvMv
Targets
-
-
Target
osintool.exe
-
Size
632KB
-
MD5
20181934a508ec23e7c2223be3c58e3b
-
SHA1
a29f3f89d10ff05f4589466bc11a2fd45016e0e5
-
SHA256
28fda1422979b63fd9b489a76cf5e43e68aa095eae547e96f050550b37208cab
-
SHA512
8f0a1dfa0e627d7779754cd045dc9dcaedbcb332870962706a9bbcc69d9383c8166c940844047ba4a85e3209f5bf0d284f7e84e67345347f8f2c21d93ef043f7
-
SSDEEP
12288:hoZtL+EP8shN9rI8jS67NokRq8zNiMdRC:fI8iN9rI8jS67NokRlBiMdA
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1