General
-
Target
wexside.exe
-
Size
238KB
-
Sample
241230-3b6zvstlej
-
MD5
197e386d613b87bb8b3c834228ba2d18
-
SHA1
095c5dcb7d12080dc47df4fec784fd053bd55931
-
SHA256
c2fe8b9e983021434ee8805969733c76b0e598a49bb24b3bd9e51ca18ef964bf
-
SHA512
33371058ee6e1fbdce569c74d619a8bc1c3d00cd693b4e9687ab8ea68c7fb0bfd7e8113893de7a44b1824f543b9555606d1cd5c2f0ff32f5dc052774263b82a7
-
SSDEEP
6144:DloZM+rIkd8g+EtXHkv/iD4EnxpjpaC9Qop7mGzkob8e1motiN:hoZtL+EP8EnxpjpaC9Qop7mGzVy
Behavioral task
behavioral1
Sample
wexside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wexside.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wexside.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1321972805377589339/LosDAkoZdJZcanAkQR_rIAR5XUiH9-iv3mN54MiGrmK1c5XHr0lO4BFzxTUpAqXb7taz
Targets
-
-
Target
wexside.exe
-
Size
238KB
-
MD5
197e386d613b87bb8b3c834228ba2d18
-
SHA1
095c5dcb7d12080dc47df4fec784fd053bd55931
-
SHA256
c2fe8b9e983021434ee8805969733c76b0e598a49bb24b3bd9e51ca18ef964bf
-
SHA512
33371058ee6e1fbdce569c74d619a8bc1c3d00cd693b4e9687ab8ea68c7fb0bfd7e8113893de7a44b1824f543b9555606d1cd5c2f0ff32f5dc052774263b82a7
-
SSDEEP
6144:DloZM+rIkd8g+EtXHkv/iD4EnxpjpaC9Qop7mGzkob8e1motiN:hoZtL+EP8EnxpjpaC9Qop7mGzVy
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1