General
-
Target
Nursultan Crack 1.16.5 (infected).7z
-
Size
111KB
-
Sample
250106-hnnzlazjct
-
MD5
12e7124cf069c75347e8291b5a682f85
-
SHA1
c66a93d01796b51f81577cfd4629b439e69da530
-
SHA256
e36bae9f31355d5d5ffdb550c1d7d1c0f88a7f52f7bae1288a6f9e5008f6471b
-
SHA512
5f0cc0697b68e7fa64df395e38a8586299aa97f3d33316cea3458591f7d83d36b7f319a6ad83773368e8d04ddd53f6a5f6b0a2d054d3480e565375a1a495f775
-
SSDEEP
1536:ymRAf4Fyhjpllzf89PZBmEdKPWCniAaPzJFUUjRIK+zzGhUQrosmgvP4+9iMagHo:yE50VU9xiW7L0USSuQwgvPHIkQIGR
Malware Config
Targets
-
-
Target
Nursultan Crack 1.16.5 (infected).7z
-
Size
111KB
-
MD5
12e7124cf069c75347e8291b5a682f85
-
SHA1
c66a93d01796b51f81577cfd4629b439e69da530
-
SHA256
e36bae9f31355d5d5ffdb550c1d7d1c0f88a7f52f7bae1288a6f9e5008f6471b
-
SHA512
5f0cc0697b68e7fa64df395e38a8586299aa97f3d33316cea3458591f7d83d36b7f319a6ad83773368e8d04ddd53f6a5f6b0a2d054d3480e565375a1a495f775
-
SSDEEP
1536:ymRAf4Fyhjpllzf89PZBmEdKPWCniAaPzJFUUjRIK+zzGhUQrosmgvP4+9iMagHo:yE50VU9xiW7L0USSuQwgvPHIkQIGR
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1