General
-
Target
blasted.exe
-
Size
229KB
-
Sample
250105-tm38ns1mcn
-
MD5
21e6f749bf59138d1528e64a34a88903
-
SHA1
4f2447e8476dad93e39aac775a7bf91c2c8cd4b8
-
SHA256
9952e7c346539dc361b2bda461eebf047ce00a2e3eb2bb3ab6f3fa0c0b5d87d5
-
SHA512
2cad6e33730a69bc31378ae4f502f37f6d8f6d1fd85c17830108ab6b056f1b5994bf8254530194df655e433689c2c22e53fea94c5958f8c1ee55f938a6e5486c
-
SSDEEP
6144:dloZM9rIkd8g+EtXHkv/iD4ZF3A6YXzQAp8aLLyfxmb8e1m6i:/oZmL+EP8ZF3A6YXzQAp8aLLyIo
Behavioral task
behavioral1
Sample
blasted.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1318597375148687402/hi7z2fLgO4RRvXrp-fdHKsRpZGU-JbAhrm4wxVPBT5TIEA3KCmg8Y6RBurUI3jSJhEQ5
Targets
-
-
Target
blasted.exe
-
Size
229KB
-
MD5
21e6f749bf59138d1528e64a34a88903
-
SHA1
4f2447e8476dad93e39aac775a7bf91c2c8cd4b8
-
SHA256
9952e7c346539dc361b2bda461eebf047ce00a2e3eb2bb3ab6f3fa0c0b5d87d5
-
SHA512
2cad6e33730a69bc31378ae4f502f37f6d8f6d1fd85c17830108ab6b056f1b5994bf8254530194df655e433689c2c22e53fea94c5958f8c1ee55f938a6e5486c
-
SSDEEP
6144:dloZM9rIkd8g+EtXHkv/iD4ZF3A6YXzQAp8aLLyfxmb8e1m6i:/oZmL+EP8ZF3A6YXzQAp8aLLyIo
-
Detect Umbral payload
-
Umbral family
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1