General
-
Target
octosint.exe
-
Size
631KB
-
Sample
241130-l7hhpsvrck
-
MD5
3fbddef1a1957c47cc788a7ea3be9bf1
-
SHA1
5d68695893be73ad26a1b6115ac38a3e72e11cbf
-
SHA256
f6978810fc08e07982be2acda6f8692bca7011119e15088fcb2ab006de8dece7
-
SHA512
76cb0b768c15464ae4dc41d90909a1c740de8e2b3f7b8d37f255068e5a0bd0c6d666e68fcfec47f6cca268de5cf24bc2a85800fb3fe3244fe25b60b8f17c5e54
-
SSDEEP
12288:5oZtL+EP8gGVK9rI8j967NokRRC9iMdRC:XI8LVK9rI8j967NokRRsiMdA
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1312351295071322142/KvqTDknVHFVZzAuuZpGugxnURuyFuocCHU5Ju80VDkuodo7V_2vvqkBAObQfbAMgULRR
Targets
-
-
Target
octosint.exe
-
Size
631KB
-
MD5
3fbddef1a1957c47cc788a7ea3be9bf1
-
SHA1
5d68695893be73ad26a1b6115ac38a3e72e11cbf
-
SHA256
f6978810fc08e07982be2acda6f8692bca7011119e15088fcb2ab006de8dece7
-
SHA512
76cb0b768c15464ae4dc41d90909a1c740de8e2b3f7b8d37f255068e5a0bd0c6d666e68fcfec47f6cca268de5cf24bc2a85800fb3fe3244fe25b60b8f17c5e54
-
SSDEEP
12288:5oZtL+EP8gGVK9rI8j967NokRRC9iMdRC:XI8LVK9rI8j967NokRRsiMdA
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1