General
-
Target
SupremeVip.exe
-
Size
231KB
-
Sample
241219-ss2rcsvkcz
-
MD5
c824211fa3c507fee0dea2c75eb0fe53
-
SHA1
8f43608f64d43b91014c371d484adbe7af1cc3e5
-
SHA256
83fad99df9cf86912dcc087e5936d7643cba31a82fad2c03fa3efcbd9bbff59e
-
SHA512
d318d6d7e4010d6df403a6423280104067c178e73ba06691c7739bc164eb5583e0a6114e88c2c67700666730f7fedb8c505f6dd2bf8f0e0cd1ff75dd5c2a08fd
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4ec6piAfboTxUyzzqLuQb8e1mJMPi:joZtL+EP8ec6piAfboTxUyzzqDFa
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1318967515556216914/uT31LZVFolMqiCb1yniFGZeuzzN2PI9C87EmIEyk59rUkDSrmKlU6HbMzsTSJa2dWOb0
Targets
-
-
Target
SupremeVip.exe
-
Size
231KB
-
MD5
c824211fa3c507fee0dea2c75eb0fe53
-
SHA1
8f43608f64d43b91014c371d484adbe7af1cc3e5
-
SHA256
83fad99df9cf86912dcc087e5936d7643cba31a82fad2c03fa3efcbd9bbff59e
-
SHA512
d318d6d7e4010d6df403a6423280104067c178e73ba06691c7739bc164eb5583e0a6114e88c2c67700666730f7fedb8c505f6dd2bf8f0e0cd1ff75dd5c2a08fd
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4ec6piAfboTxUyzzqLuQb8e1mJMPi:joZtL+EP8ec6piAfboTxUyzzqDFa
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1