General
-
Target
Nurik 1.16.5 crack.rar
-
Size
437.3MB
-
Sample
241212-w6335asqbz
-
MD5
ae6cda2c29e523d08261d8677262931a
-
SHA1
f1eed58893a381251162cc3ffb5186eb0b659aba
-
SHA256
1bffedc1b7463821d78cf8a3922ae351f79264de77ed908689b583fc3dceea7d
-
SHA512
ba9c5488e14de13b184ede8ffe46fed5afdeb7f4108bd6333341d3abfa2dbb9978de0711be86783295812a41de3d5c2bc5b32324ba38710f173a78cfd7d2c90d
-
SSDEEP
12582912:U8eyYu5LRaaSbmorqMWyMeY8ioclXIb7wRM+QA7gSr89:U8eyY00aSbmmpWyMT8duX87x+/73rk
Static task
static1
Malware Config
Targets
-
-
Target
Nurik 1.16.5 crack.rar
-
Size
437.3MB
-
MD5
ae6cda2c29e523d08261d8677262931a
-
SHA1
f1eed58893a381251162cc3ffb5186eb0b659aba
-
SHA256
1bffedc1b7463821d78cf8a3922ae351f79264de77ed908689b583fc3dceea7d
-
SHA512
ba9c5488e14de13b184ede8ffe46fed5afdeb7f4108bd6333341d3abfa2dbb9978de0711be86783295812a41de3d5c2bc5b32324ba38710f173a78cfd7d2c90d
-
SSDEEP
12582912:U8eyYu5LRaaSbmorqMWyMeY8ioclXIb7wRM+QA7gSr89:U8eyY00aSbmmpWyMT8duX87x+/73rk
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1