General
-
Target
Nursultan CrackLauncher (infected).zip
-
Size
370KB
-
Sample
250101-d4tskawkaj
-
MD5
7268ab836cf40a9f014de23d3541f3e1
-
SHA1
a5515ed5310deab8dfa5609eaaa2d55725f98a56
-
SHA256
845412b126125d6581e02480cb372ab7e867c9c36dab2d67e09b7a3cbe4d2194
-
SHA512
0ec3326f1fe6e6874496d3c725811f418c0b0d9ea487cfa4ce5f0edf52bf18730af501cdd83dcd079e8a027219f16187e5e86bab95920cbc82a3cf6ce2efceb0
-
SSDEEP
6144:wunj7WIjEW6h7XRshfNZu+8SrFbslmJrp6zMvTNlOU2g2Pn8Qgv:wCWIo7XeAylslGrp6432Nfcv
Static task
static1
Malware Config
Targets
-
-
Target
CrackLauncher.exe
-
Size
376KB
-
MD5
2a62ae30d23236f10284cec83783dda1
-
SHA1
04c528b61e01e6444ca30bc346dd6f38d4e8c8a6
-
SHA256
fdbda1e73337813b63b388173d5311bcb9198d73ad4a0f15661af5fb5680f219
-
SHA512
321868f629f5fba5f2144192598327081744ca22938d371fe480a6fcd54ffb9665c056452c5d7092a330c770f49167d4830435a2f7a8c3a9c2d2a78dd95c39ea
-
SSDEEP
6144:CR9tZo8WQzx19RgGppFWFC71UbyenXtL/Z0EyzPsO5FR0guVi389xaYVQ:CR7ZnVfMGTFgCZWRnXJOEyTD5T0guVu7
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1