General
-
Target
c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37dN.exe
-
Size
229KB
-
Sample
250107-klvqgavpep
-
MD5
528f26b2d46cd04b6fcb6fafcb3abf40
-
SHA1
857455c1dcdcd7bceabfff1f532ee3714e743245
-
SHA256
c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37d
-
SHA512
20c0c8b69d8fb6045ac3f2e83fca527ac99a68375e62b4b3d8d66daa402ddfad1640f63721871aa2254bf71bb58beae2ef30a50154ef9dc6fa6c4a35999d8c5a
-
SSDEEP
6144:FloZM+rIkd8g+EtXHkv/iD4AFyuMS1NmYzus9x4uab8e1mti:HoZtL+EP8AFyuMS1NmYzus9x45j
Behavioral task
behavioral1
Sample
c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37dN.exe
Resource
win7-20240729-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1313811831906762792/0E535NbdSliQWNEaFE2OeKp9ttWU5OcljhalGUnuKioPrSNPnNb45qh5ZMmcXLPrAWI1
Targets
-
-
Target
c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37dN.exe
-
Size
229KB
-
MD5
528f26b2d46cd04b6fcb6fafcb3abf40
-
SHA1
857455c1dcdcd7bceabfff1f532ee3714e743245
-
SHA256
c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37d
-
SHA512
20c0c8b69d8fb6045ac3f2e83fca527ac99a68375e62b4b3d8d66daa402ddfad1640f63721871aa2254bf71bb58beae2ef30a50154ef9dc6fa6c4a35999d8c5a
-
SSDEEP
6144:FloZM+rIkd8g+EtXHkv/iD4AFyuMS1NmYzus9x4uab8e1mti:HoZtL+EP8AFyuMS1NmYzus9x45j
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1