General
-
Target
Swift.exe
-
Size
231KB
-
Sample
250104-vm97naylhz
-
MD5
6e2fe62ba106a5e869fabb48565305ed
-
SHA1
56a781fe3ed0182ae22c6c10690d2ae4e870be6e
-
SHA256
b0994dcb3d7268ace7b5fd363bf09683e2ba2d900149151602c277f36548c1a5
-
SHA512
48759991bed49f9366f088b15a3794c45189951b73aba3b977b16070d51067b2216c3740654c387fcc28bef159393c0d01923c84d1f029b8412957652fb9867e
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4j0iWVjgULryD1Ac5hJ5b8e1mDvi:joZtL+EP8j0iWVjgULryD1Ac5vRR
Behavioral task
behavioral1
Sample
Swift.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Swift.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1325147610498990184/_S5t34piVZ9w4jNK0Uk7vmAagN7mrlofpStBmLWZihZU4CFArBMOQ3stCZ2bi-ynKaHD
Targets
-
-
Target
Swift.exe
-
Size
231KB
-
MD5
6e2fe62ba106a5e869fabb48565305ed
-
SHA1
56a781fe3ed0182ae22c6c10690d2ae4e870be6e
-
SHA256
b0994dcb3d7268ace7b5fd363bf09683e2ba2d900149151602c277f36548c1a5
-
SHA512
48759991bed49f9366f088b15a3794c45189951b73aba3b977b16070d51067b2216c3740654c387fcc28bef159393c0d01923c84d1f029b8412957652fb9867e
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4j0iWVjgULryD1Ac5hJ5b8e1mDvi:joZtL+EP8j0iWVjgULryD1Ac5vRR
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1