General
-
Target
Fizzy Loader (infected).zip
-
Size
88KB
-
Sample
250101-dyndlasra1
-
MD5
bdd562f68e39fcce44902713a1b74aa0
-
SHA1
7a3e8189c5f040435f5ba3423959dd1de5bd1771
-
SHA256
dcd2165bc18a4476c887c7e62358ca63cb3d3b3425b0ee09acd362d1972a679f
-
SHA512
611c312a6638476a08a9063131b9477edc17bc6566a0cfff3f4fbf68dd38aec837160dc679615886657e0ce3ef137b40774aa671e2340366027611ef5a2bb30f
-
SSDEEP
1536:KpLn43go769Trdlt+gvRhZ+UOSJKgzHC8iSqB83kJQwzwoMW9TkNTpZ:KpL4QDdlWUOSeYbwphkNTH
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1323224754576166912/ngAQr5IRg8PVqlg_GePwPe46g-WcVmFR7-gQu1RH44lVF1JX9hv6jSy8rNgxBAU6LxYx
Targets
-
-
Target
Fizzy Loader.exe
-
Size
229KB
-
MD5
b56af795f8b7edc6f35a9e905921ed0e
-
SHA1
c82cb0088bc9c93fd9a491ad278f410d44265a4d
-
SHA256
46a67cdc899f61ccb6324d187d56b389f720d72beb02594fd60fdc4a8ca62ab4
-
SHA512
c35b429e243845337903fa5cc6853c6921514b2fcd84e7788607aa47414be9b2101c8b87acd1766666daa7fc0cdd2b7a5be19ac5754db8f12c3e262ea792f9c6
-
SSDEEP
6144:dloZM+rIkd8g+EtXHkv/iD4M7+QWRJ6RvSgR1E9/gF8e1mfIi:/oZtL+EP8M7+QWRJ6RvSgR1Ecqx
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1