General
-
Target
FN_kolt_woofer.exe
-
Size
229KB
-
Sample
241228-tn93lszjfx
-
MD5
88e82fa4e92eaed5b089d99ca669fbd3
-
SHA1
c6287977d98930e7022fc1c6dfbfc4e302b724c8
-
SHA256
1a4e8449edc0e1f28f95ee9eaba0129264d90168797e65c47502996b15fbcde5
-
SHA512
5759f49a352d54c5d6be12b9f03d15757a802bde7da91f28bdac2ccc22f1afb852e3d734e54eb2e7f2129c8c4213421f991692882a15569a93430e137c1d1e7b
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4T6FcHdmOhyU9va6vyvb8e1mti:noZtL+EP8T6FcHdmOhyU9va6vM/
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1322576460233310239/6_wiWtzQcW0DjdxEb7s3m1q1GXR6Nn8yox-lCYNIkeI8fCOrmCSg8qqtlHFzL-ivzVr6
Targets
-
-
Target
FN_kolt_woofer.exe
-
Size
229KB
-
MD5
88e82fa4e92eaed5b089d99ca669fbd3
-
SHA1
c6287977d98930e7022fc1c6dfbfc4e302b724c8
-
SHA256
1a4e8449edc0e1f28f95ee9eaba0129264d90168797e65c47502996b15fbcde5
-
SHA512
5759f49a352d54c5d6be12b9f03d15757a802bde7da91f28bdac2ccc22f1afb852e3d734e54eb2e7f2129c8c4213421f991692882a15569a93430e137c1d1e7b
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4T6FcHdmOhyU9va6vyvb8e1mti:noZtL+EP8T6FcHdmOhyU9va6vM/
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1