General
-
Target
Slinky (infected).zip
-
Size
35.0MB
-
Sample
241230-ll69yaxkev
-
MD5
dd023f6d41f8f2f06f959da73f6155de
-
SHA1
64c0cb253073cb4314a6b8491d05e6338d41b6c1
-
SHA256
e8ca7b16e9cf6d75c2cda06a34f001d9da94a2de407758837aa77dc5d79b22f9
-
SHA512
04dbd52a1f19623d14d4d501840690a107b3b8141404cccda5b5477a5bb60ef4e5eea5e6954305b5d34382a38894dc27bfe0b2fa1b90b15ddea9ec1475915380
-
SSDEEP
786432:JFUtju4TxpFDi94Z9dF76v6NhEzGZ1I73hsSACyeCBDC:nYjra9mtDVIrhHvoC
Static task
static1
Malware Config
Targets
-
-
Target
Slinky (infected).zip
-
Size
35.0MB
-
MD5
dd023f6d41f8f2f06f959da73f6155de
-
SHA1
64c0cb253073cb4314a6b8491d05e6338d41b6c1
-
SHA256
e8ca7b16e9cf6d75c2cda06a34f001d9da94a2de407758837aa77dc5d79b22f9
-
SHA512
04dbd52a1f19623d14d4d501840690a107b3b8141404cccda5b5477a5bb60ef4e5eea5e6954305b5d34382a38894dc27bfe0b2fa1b90b15ddea9ec1475915380
-
SSDEEP
786432:JFUtju4TxpFDi94Z9dF76v6NhEzGZ1I73hsSACyeCBDC:nYjra9mtDVIrhHvoC
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-