General
-
Target
NerestPCFree 0.31.1 fixed.exe
-
Size
231KB
-
Sample
241211-zy1vkssqgm
-
MD5
08dce587975cb4a6cb1333bd7d3aea6c
-
SHA1
4c855f6bb5cad027522d0a063cb4f1cd6e97b163
-
SHA256
0c6e6a1c2c50a0a1ab3f74ea0985e14003921c3b7f4e427b56c7673439accb8b
-
SHA512
19f21d6f976a971f4bffbf74a7b6450ec6b6ec02d837422a5c5edbd3fb825e630642e4b840e181484a2e0e47997631ad7012f1f710aa098538164c8998592f81
-
SSDEEP
6144:xloZMCrIkd8g+EtXHkv/iD4LsUtt74szYKrd4UBr8b8e1mOoi:DoZZL+EP8LsUtt74szYKrd4UBAJ
Behavioral task
behavioral1
Sample
NerestPCFree 0.31.1 fixed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
NerestPCFree 0.31.1 fixed.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
NerestPCFree 0.31.1 fixed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
NerestPCFree 0.31.1 fixed.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1316459606511321098/TvHF2Wj_8rIbJFWgoWfea3yBq7EFCAkU4H1E9qXeP8ohhCK3zdFFD7JhEg6NKy3UEaq9
Targets
-
-
Target
NerestPCFree 0.31.1 fixed.exe
-
Size
231KB
-
MD5
08dce587975cb4a6cb1333bd7d3aea6c
-
SHA1
4c855f6bb5cad027522d0a063cb4f1cd6e97b163
-
SHA256
0c6e6a1c2c50a0a1ab3f74ea0985e14003921c3b7f4e427b56c7673439accb8b
-
SHA512
19f21d6f976a971f4bffbf74a7b6450ec6b6ec02d837422a5c5edbd3fb825e630642e4b840e181484a2e0e47997631ad7012f1f710aa098538164c8998592f81
-
SSDEEP
6144:xloZMCrIkd8g+EtXHkv/iD4LsUtt74szYKrd4UBr8b8e1mOoi:DoZZL+EP8LsUtt74szYKrd4UBAJ
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-