General
-
Target
octosint.exe
-
Size
628KB
-
Sample
241130-kr54dstpfl
-
MD5
b4effaa19b06eb4a92b66b0ff2702c91
-
SHA1
703aa3cec640517f6e51033c27bef4bbeb9afe9b
-
SHA256
2464cc00fd3a0e7b5fd2e171e967b2ef65fde94bff68dda2dab12e2b9dce108d
-
SHA512
d7e379b2148dc4697e7cd1529ef88bc5386f66df992afcb4423b4f24a7402b18531aee341c3dc22fe97d37583d7856a13cd1cdbeb341b042f0b547f485e09cd8
-
SSDEEP
12288:2oZtL+EP8GwI8EKtFu9r20VJg2VFRiMdRC:qI8fI8EKtFu9r20VJg2hiMdA
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1312316482243395674/CDkI6IYU75yTK5pEycJanJbjsbPzw6RgBf66q4IBGfhFOO-3MKhxAx0JU_T7bQvERqBt
Targets
-
-
Target
octosint.exe
-
Size
628KB
-
MD5
b4effaa19b06eb4a92b66b0ff2702c91
-
SHA1
703aa3cec640517f6e51033c27bef4bbeb9afe9b
-
SHA256
2464cc00fd3a0e7b5fd2e171e967b2ef65fde94bff68dda2dab12e2b9dce108d
-
SHA512
d7e379b2148dc4697e7cd1529ef88bc5386f66df992afcb4423b4f24a7402b18531aee341c3dc22fe97d37583d7856a13cd1cdbeb341b042f0b547f485e09cd8
-
SSDEEP
12288:2oZtL+EP8GwI8EKtFu9r20VJg2VFRiMdRC:qI8fI8EKtFu9r20VJg2hiMdA
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1