General
-
Target
My first crack.rar
-
Size
80KB
-
Sample
241220-nyfc4awnfm
-
MD5
bd30444d4d31ce1b1ab7d0985d562c4a
-
SHA1
8365b70e49a461166a3fa91d7a2de8b98eec68e9
-
SHA256
dc1fd062f4b5dedf2e3c9e3a50f2c0bf6d96ec83bb12f95cab6cf47c395994b4
-
SHA512
111462479650315c73decf7e9e0396b873d9f0e23ac35932fe56f8aec7a6e2770fbb15323e3c33c2e782c2e58777b1975cb725c5bca179f778557eec00029602
-
SSDEEP
1536:TpcWhrJks7JCizXghk86zzFyLsM8IYVswvBAvUZyQQ/3t3braJqNKm1DedhEf0J:VX7JCibghk3zo8IYVVBBO314qNKp7l
Behavioral task
behavioral1
Sample
Crack.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1319425125715673229/q2ezIsmvMrlJUcTHQhPZCbdg7jfy8TL8rSJG25gTeHqiH2m0WbS69zx7cA68K8JyC_Ni
Targets
-
-
Target
Crack.exe
-
Size
229KB
-
MD5
54a4fef24ac2c3ee74b2999530825faa
-
SHA1
c03fd109fe013c11a780120841b2441fb747cf51
-
SHA256
766d71850cce1d3ce7ccecd302b3ff2049e765e48cbd69c53b4f122754a7f14f
-
SHA512
97a5d1dd811a51200115a3f878940f4fd6ac8bd1dbf6081c251290aeec6962d277f48c02075aefbcfa672805bf4921c8a8c2abfa0bf20e76bf13c6c6738a8419
-
SSDEEP
6144:9loZM+rIkd8g+EtXHkv/iD4AvO18il92ADe8NhoKub8e1mCi:foZtL+EP8AvO18il92ADe8Nhohs
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-