General
-
Target
osintbeta.exe
-
Size
631KB
-
Sample
241130-hzha7axqft
-
MD5
651f9b8d2e6d57a5ad192c4f9e6bc5fe
-
SHA1
351d05c661abc76b335cb99b620a8a81367e41de
-
SHA256
10a0c83bc6522b597850d3871616715533031cba948807d3831b5a239d5d7f9b
-
SHA512
9573a78740c3ada200d282c34ffb07bc4f5549a7ddd5dcdf5f0070aba5be5cc0bdc0ab1bc54bd0283a43bc34febc5e0c7fb1ade6bb5173e598890be76445256b
-
SSDEEP
12288:hoZtL+EP8l1xMw2xpamPyAxVkghNiMdRC:fI8rxMw2xpamPyAxVkgriMdA
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1312288623672037376/2GH04B8YXsC6XReHUK0ahKf5rxv-juGkGHKoDn44G9e1LgY6b0deNb9KwidwVkVbfmse
Targets
-
-
Target
osintbeta.exe
-
Size
631KB
-
MD5
651f9b8d2e6d57a5ad192c4f9e6bc5fe
-
SHA1
351d05c661abc76b335cb99b620a8a81367e41de
-
SHA256
10a0c83bc6522b597850d3871616715533031cba948807d3831b5a239d5d7f9b
-
SHA512
9573a78740c3ada200d282c34ffb07bc4f5549a7ddd5dcdf5f0070aba5be5cc0bdc0ab1bc54bd0283a43bc34febc5e0c7fb1ade6bb5173e598890be76445256b
-
SSDEEP
12288:hoZtL+EP8l1xMw2xpamPyAxVkghNiMdRC:fI8rxMw2xpamPyAxVkgriMdA
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1