General
-
Target
osintbeta.exe
-
Size
631KB
-
Sample
241203-2mzjgsxrgt
-
MD5
563db1fc707e29d140d343e75ee9d389
-
SHA1
ece61378cffc5f950dec95249eeebe9d01f17496
-
SHA256
bf59201502504351baacaa124496df5d010b90c828c10a3413c9d40409f30ec9
-
SHA512
e17836e475dd607ea8502012845b7ee13ef12b01ae11745706735a23ef0b9133c8e645d905e2005b2842fea18bd8c39c0b002cda66dfd89be8a658c8aa7dab45
-
SSDEEP
12288:hoZtL+EP8smVkvFuW5a8VHCCHGmNiMdRC:fI8nVkvFuW5a8VHCCHGIiMdA
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1312360330701045821/Xa2tsxokqziFd_WOVNguuOe12yjZtbjooKiwQx5VnlfwNsU9VmoUDiiMr1hV8WOJ1O7G
Targets
-
-
Target
osintbeta.exe
-
Size
631KB
-
MD5
563db1fc707e29d140d343e75ee9d389
-
SHA1
ece61378cffc5f950dec95249eeebe9d01f17496
-
SHA256
bf59201502504351baacaa124496df5d010b90c828c10a3413c9d40409f30ec9
-
SHA512
e17836e475dd607ea8502012845b7ee13ef12b01ae11745706735a23ef0b9133c8e645d905e2005b2842fea18bd8c39c0b002cda66dfd89be8a658c8aa7dab45
-
SSDEEP
12288:hoZtL+EP8smVkvFuW5a8VHCCHGmNiMdRC:fI8nVkvFuW5a8VHCCHGIiMdA
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1