General
-
Target
rassword1234 (1234).zip
-
Size
91KB
-
Sample
250101-d1ymcasrgz
-
MD5
db90b8f68e201b3bc7dabb585840bc20
-
SHA1
12cfcc306937a172e27588bc55e08b38e6323e93
-
SHA256
384aa67fa0f32cf50cf1e51d0372e66bb05ccc32fbc353328337a50cf6f27f50
-
SHA512
09c3445ad6fd8dc7d713dc05a8ee68caffcf049f2789b22867a2bcdef173b11e17843791653523f9dd4fa72ac1b05f2831e4c70eca990bfad644ae4ad630d77e
-
SSDEEP
1536:Gb+0sj9snLsi+HiUqpyRZW7kXZIgb2aZaarA4GJG7oNUOVEI79m6DcoZoLCmp8Kd:Gb+0sj+LsV874ZNDAMPkfNUOV1zZXmzd
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1323573810049323031/dk-sXtjCoHS8zh-0KkPlF-dduFzLCiHy-YsKxuLn1B_D2U_NGlbGreTuDpJJpPerog_U
Targets
-
-
Target
rassword1234/cheat.exe
-
Size
229KB
-
MD5
cd8c210fc317138b5e27619acfec272c
-
SHA1
b7434937fe520f90be7bd201a98e0bc5e7e42cb1
-
SHA256
d9e775b843c911bbe67e18bfec500437fc5357968ad5ba814c9bff8db5e3bca6
-
SHA512
b70f654a6724d0091f9b2a19347bae84d1e95378678a507c019c3a203df50560304a72cadc2f38defb2e7a1a46a1a1902e6410706f6fdd391464c57835427127
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4bxv/GELnsTd42X3WbVb8e1mRi:noZmL+EP8bxv/GELnsTd42X3Wxf
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1