General
-
Target
Insta-Checker.rar
-
Size
12.5MB
-
Sample
241203-zvpyxazkbn
-
MD5
c864c6ebc454038b621f3bc8e7f95e39
-
SHA1
b1300ab696a8bbcf9b298b077a64dc9c009bd4b3
-
SHA256
964a54a737831c42dbd01e9dad0032ee2431cd67d3b2876efa10dd7362385388
-
SHA512
c42779e89a8e8d8249c2bf70aebdeae2d18a70e331db33a49396aae9ab27515c84b4879f228b8ca46070e3311616a0bacf5f24c272eb5017c2f396c351588ecf
-
SSDEEP
393216:j6FSmKUd1aoRX7gJ1blsrJh/WoKncv2TJdC:j6FsUdr7e1blIuoKncvaJdC
Behavioral task
behavioral1
Sample
Insta-Checker.rar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Insta-Checker/Data/Modules/instachecker.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Insta-Checker/Data/Modules/instachecker1.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1311853028680400957/msEao2pygwFSejk9GVaCuiS6YFPyMErZ4uLPA42C6h_TCBboJi6x98y5-EcCuL9UYch8
Targets
-
-
Target
Insta-Checker.rar
-
Size
12.5MB
-
MD5
c864c6ebc454038b621f3bc8e7f95e39
-
SHA1
b1300ab696a8bbcf9b298b077a64dc9c009bd4b3
-
SHA256
964a54a737831c42dbd01e9dad0032ee2431cd67d3b2876efa10dd7362385388
-
SHA512
c42779e89a8e8d8249c2bf70aebdeae2d18a70e331db33a49396aae9ab27515c84b4879f228b8ca46070e3311616a0bacf5f24c272eb5017c2f396c351588ecf
-
SSDEEP
393216:j6FSmKUd1aoRX7gJ1blsrJh/WoKncv2TJdC:j6FsUdr7e1blIuoKncvaJdC
Score1/10 -
-
-
Target
Insta-Checker/Data/Modules/instachecker.exe
-
Size
231KB
-
MD5
cec40612e64e3c8df04870610dafe7aa
-
SHA1
3a0fbfebe571c665e547bda8ec018817c2ae1094
-
SHA256
626257599554ffaf796d03057041b46b1b3ce07962be11f0c6c6bce82ef7ba43
-
SHA512
7d473ef2e6bedd05bd12550b925320f4cf0ee91f4b66b457dc34befa427c28bfbe0b81cdd0b5d5fd3b6434757a81016ca1d32ac00088accc6fc27cba9bf0c7b8
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4dmIB1DA0rMSjVg8Zafb8e1mDkei:DoZtL+EP8dmIB1DA0rMSjVg8ZszT
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Insta-Checker/Data/Modules/instachecker1.exe
-
Size
12.0MB
-
MD5
881bc5071aeea80252bb7930a40e0422
-
SHA1
59c4b3cc4ae09c510b6784e39570ac7a77228a9c
-
SHA256
b4d0e05f45b04d47c78fd9cf4b8539dd6afa080f37c230a512a9516b7dbd331a
-
SHA512
9d839a8613bac7cdca5ce375f9a3c56721884769762654dd7fd4bd5ed62acd68e5bbfaa0d29b58423284d85aa12d69b873a51bbe9e6a6f5d0b55f8aed49dc543
-
SSDEEP
196608:eIbY7HakrIK63UtauZijIXMCHGLLc54i1wN+QPIcu9KYK39shSEo3PPik2MeKOq:Yae63hucsXMCHWUj/cuId9/PiVTF
Score7/10-
Loads dropped DLL
-
-
-
Target
Insta-Checker/Start Checker.bat
-
Size
73B
-
MD5
8bed69e923be9aa02cb98665b15d1819
-
SHA1
a265ea13dce2e85b9bb779e3383863a0ed16b0cb
-
SHA256
398a166f3aa6183f6fc816c10e18d981d0c681ba63d488946b52fa1dde7de397
-
SHA512
60b5fa29f23efa3512c8119ae075c9a3dbd446cc60bc373af6c7209bdfe661ca325be8a5b03c7f73575bb80dd35e067c3e306937576f3ad482d4bd66330460ab
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1