General
-
Target
roblox beamer.exe
-
Size
229KB
-
Sample
241224-zt5b7sxmel
-
MD5
e8291587d7fd8bc8704e1115abe62ac6
-
SHA1
6a71de3d8aece949377efd526a222939ad3a01f5
-
SHA256
fb909a020c044cd3da4445891bbf2e3dbeb9527e84ce04efc0640b43061da547
-
SHA512
806a572f8784a37138b4fb19b4b7dbc93ef2b7e14aba9bb3a78c2d6a3882f1c0b5eb36c21e98065f7c5454a9e33f07aa200b13fb2cebd8a52c16b401603cf994
-
SSDEEP
6144:qloZM+rIkd8g+EtXHkv/iD4EjKLBPUon+WvRsY9GLb8e1mji:UoZtL+EP8EjKLBPUon+WvRsY9wZ
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1152961921033715743/CDLHLQ0cTzYVPLUJlX--rQL-OhDTmViTrV95RJR2MIv25RRoK7gTnU4u5nzknzyl2O1Z
Targets
-
-
Target
roblox beamer.exe
-
Size
229KB
-
MD5
e8291587d7fd8bc8704e1115abe62ac6
-
SHA1
6a71de3d8aece949377efd526a222939ad3a01f5
-
SHA256
fb909a020c044cd3da4445891bbf2e3dbeb9527e84ce04efc0640b43061da547
-
SHA512
806a572f8784a37138b4fb19b4b7dbc93ef2b7e14aba9bb3a78c2d6a3882f1c0b5eb36c21e98065f7c5454a9e33f07aa200b13fb2cebd8a52c16b401603cf994
-
SSDEEP
6144:qloZM+rIkd8g+EtXHkv/iD4EjKLBPUon+WvRsY9GLb8e1mji:UoZtL+EP8EjKLBPUon+WvRsY9wZ
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1