General
-
Target
visatool.exe
-
Size
229KB
-
Sample
250106-hkm8ws1qfq
-
MD5
8d12001c93eefec83bc3df9b79fd662e
-
SHA1
f2a218e2fe72e57f0c169e58af5a5bad232b155a
-
SHA256
17122c0a46007455035997b94a339b664d1b69cae5cf6a7b0544be7c2bed0326
-
SHA512
8878a410caa7a29a9bdd619f7566a10cd41fd97919bcefaa9641d6b3a91fad685cb375a8a0127d7296478f918372d680fe289f2bb84ef72ca3a3ec3eb7edd2ce
-
SSDEEP
6144:lloZMmrIkd8g+EtXHkv/iD4FOjFT5KyN54ZL22j3vtB48e1mfi:noZ1L+EP80jFT5KyN54ZL22jlAp
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1277999854974406696/E5jlpnaIaqj10n4mF186OXvssQJ6CXTDRHNJhNMj8V-2ZrtkJ672_8Ob61NpRqQHxlG9
Targets
-
-
Target
visatool.exe
-
Size
229KB
-
MD5
8d12001c93eefec83bc3df9b79fd662e
-
SHA1
f2a218e2fe72e57f0c169e58af5a5bad232b155a
-
SHA256
17122c0a46007455035997b94a339b664d1b69cae5cf6a7b0544be7c2bed0326
-
SHA512
8878a410caa7a29a9bdd619f7566a10cd41fd97919bcefaa9641d6b3a91fad685cb375a8a0127d7296478f918372d680fe289f2bb84ef72ca3a3ec3eb7edd2ce
-
SSDEEP
6144:lloZMmrIkd8g+EtXHkv/iD4FOjFT5KyN54ZL22j3vtB48e1mfi:noZ1L+EP80jFT5KyN54ZL22jlAp
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-