General
-
Target
986ab78ceee3c3bec343c6b7a74cf14d2c128bf7fbfd45bddbe7ab317b2c074e
-
Size
227KB
-
Sample
250109-fcy93syngw
-
MD5
cb2467ac4a120eb71d645447de9edb11
-
SHA1
9f51253c38be1f5b76a425d990ddc1f91052a14e
-
SHA256
986ab78ceee3c3bec343c6b7a74cf14d2c128bf7fbfd45bddbe7ab317b2c074e
-
SHA512
2a81afd3e9c0a7056d4c178bf51a3bd91af1a15f445b16f5b8405d1310e62f5908c1dde86232134e78ea4454d4fbc774d171d5de85bc1c7abfd5d748f9719393
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4m3eQzZqStAY5rWWDdcvb8e1m/i:ooZtL+EP8m3eQzZqStAY5rWWDoZ
Behavioral task
behavioral1
Sample
986ab78ceee3c3bec343c6b7a74cf14d2c128bf7fbfd45bddbe7ab317b2c074e.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1326452298473410600/jwR1LlensLV3jfLKn9byu5gCjvIwGxwfE_SNl7yyByvWOzpTK5yXAqO7w-bfDqH2-J2L
Targets
-
-
Target
986ab78ceee3c3bec343c6b7a74cf14d2c128bf7fbfd45bddbe7ab317b2c074e
-
Size
227KB
-
MD5
cb2467ac4a120eb71d645447de9edb11
-
SHA1
9f51253c38be1f5b76a425d990ddc1f91052a14e
-
SHA256
986ab78ceee3c3bec343c6b7a74cf14d2c128bf7fbfd45bddbe7ab317b2c074e
-
SHA512
2a81afd3e9c0a7056d4c178bf51a3bd91af1a15f445b16f5b8405d1310e62f5908c1dde86232134e78ea4454d4fbc774d171d5de85bc1c7abfd5d748f9719393
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4m3eQzZqStAY5rWWDdcvb8e1m/i:ooZtL+EP8m3eQzZqStAY5rWWDoZ
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1