General
-
Target
CounterAttack1.3.07.exe
-
Size
4.0MB
-
Sample
250109-vf5ctsxkek
-
MD5
768fac5fc9b1a6723ec5e88643cfa69b
-
SHA1
ecadbe36d1526e2564eda430956b23d41b08e41a
-
SHA256
98d6a942ccc041bb0534b401fef09d82b4d2a4690673c325217457e625e6259b
-
SHA512
e4219e87335cccf156828c9271b6e619fc2f3ad848eb3a82ddc683679efb86e4575b2c0325ede1f3a06a533cb5bbdce75bd227ff46ee309902ba7e1554411690
-
SSDEEP
49152:NNEVtO1U1y1DDDDDD7Llngq7NNMqU0p2Vhk9aQNEVtO1U1y1DDDDDD7Llngq7NN0:NNEVJyZlng4p2VeNEVJyZlng4p2VMg
Behavioral task
behavioral1
Sample
CounterAttack1.3.07.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1326955608112496710/UQehMk_daQ2YbkYBZ11umbBWXbi1b3G49GJ1zVYdBwPGpiZwYf8UJiTlt6xSrBCEwhJ_
Targets
-
-
Target
CounterAttack1.3.07.exe
-
Size
4.0MB
-
MD5
768fac5fc9b1a6723ec5e88643cfa69b
-
SHA1
ecadbe36d1526e2564eda430956b23d41b08e41a
-
SHA256
98d6a942ccc041bb0534b401fef09d82b4d2a4690673c325217457e625e6259b
-
SHA512
e4219e87335cccf156828c9271b6e619fc2f3ad848eb3a82ddc683679efb86e4575b2c0325ede1f3a06a533cb5bbdce75bd227ff46ee309902ba7e1554411690
-
SSDEEP
49152:NNEVtO1U1y1DDDDDD7Llngq7NNMqU0p2Vhk9aQNEVtO1U1y1DDDDDD7Llngq7NN0:NNEVJyZlng4p2VeNEVJyZlng4p2VMg
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1