General
-
Target
gorebox.EXE
-
Size
431KB
-
Sample
241201-le8jestmfp
-
MD5
4522fc4ba239805a83c7209452595423
-
SHA1
1a57d4e9a57bc7ef167d01928afeeab07bbd25c5
-
SHA256
7bef7c9f99847e7c368be124992565c4bcd089948d5b1ca1d1c46911c625a5b1
-
SHA512
a60cca224cfa06659089682637493f968c7de035b3aabcfb224eda4e50873d0c2198f9797a5acf28b7e92ea71ff246aed616fd8ce56d787679f54b6bfcee31cd
-
SSDEEP
6144:DahOl8p0yN90QEvNIPbKK6lyO0YYO/2IKuaiTPH2g9mfCImdp2vg0FM:DiKty90tyTK5T0YYdIKoCgkfdmP
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1312707054921842768/isqncLMa7kda5iILpNOk1bl-iVzctRU9oXMRs4eMThSQUfAbARPXl6CGuwMfCK3fZjSE
Targets
-
-
Target
gorebox.EXE
-
Size
431KB
-
MD5
4522fc4ba239805a83c7209452595423
-
SHA1
1a57d4e9a57bc7ef167d01928afeeab07bbd25c5
-
SHA256
7bef7c9f99847e7c368be124992565c4bcd089948d5b1ca1d1c46911c625a5b1
-
SHA512
a60cca224cfa06659089682637493f968c7de035b3aabcfb224eda4e50873d0c2198f9797a5acf28b7e92ea71ff246aed616fd8ce56d787679f54b6bfcee31cd
-
SSDEEP
6144:DahOl8p0yN90QEvNIPbKK6lyO0YYO/2IKuaiTPH2g9mfCImdp2vg0FM:DiKty90tyTK5T0YYdIKoCgkfdmP
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1