Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
84da387b415ad657fb91d6d5952d8f2882bb1116018a84ee9ebd502c2f2dc893.exe
-
Size
229KB
-
Sample
250108-rnd9tswjak
-
MD5
d5b2a8bb68e47bda3a870e5f46f4fe45
-
SHA1
c7ba06a0aeae1130cc0d49c697f10bca901939e0
-
SHA256
84da387b415ad657fb91d6d5952d8f2882bb1116018a84ee9ebd502c2f2dc893
-
SHA512
579196a951a91e13563f7ba5572366929b80559d0180436f1a3dc1db404a141b6ebf908995f81e1856bd0a10836a8d0e3d4cfc948a1d91f81c91f6524177e869
-
SSDEEP
6144:FloZM+rIkd8g+EtXHkv/iD4AFyuMS1NmYzus9x4uab8e1mtiY:HoZtL+EP8AFyuMS1NmYzus9x45jY
Behavioral task
behavioral1
Sample
84da387b415ad657fb91d6d5952d8f2882bb1116018a84ee9ebd502c2f2dc893.exe
Resource
win7-20240729-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1313811831906762792/0E535NbdSliQWNEaFE2OeKp9ttWU5OcljhalGUnuKioPrSNPnNb45qh5ZMmcXLPrAWI1
Targets
-
-
Target
84da387b415ad657fb91d6d5952d8f2882bb1116018a84ee9ebd502c2f2dc893.exe
-
Size
229KB
-
MD5
d5b2a8bb68e47bda3a870e5f46f4fe45
-
SHA1
c7ba06a0aeae1130cc0d49c697f10bca901939e0
-
SHA256
84da387b415ad657fb91d6d5952d8f2882bb1116018a84ee9ebd502c2f2dc893
-
SHA512
579196a951a91e13563f7ba5572366929b80559d0180436f1a3dc1db404a141b6ebf908995f81e1856bd0a10836a8d0e3d4cfc948a1d91f81c91f6524177e869
-
SSDEEP
6144:FloZM+rIkd8g+EtXHkv/iD4AFyuMS1NmYzus9x4uab8e1mtiY:HoZtL+EP8AFyuMS1NmYzus9x45jY
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1