Resubmissions
11-01-2025 02:53
250111-ddkf7ssrap 10General
-
Target
Umbral.bat
-
Size
387KB
-
Sample
250111-ddkf7ssrap
-
MD5
1e183c2ada7d55a0ccf510721415d5bc
-
SHA1
fdf973e881b0999cfde6e1a4404e0a14fba53aab
-
SHA256
5c857070215559b9e49212029a3ae61eb292347f527ba4b2f8f602eaae003654
-
SHA512
4b1a3f2e91b01468c219650e8c685bc197cb0fe2907c71db073b4a59d2cfdc91ed7975c1af01de5aed89fa59dd2b17785777e57653b896a4a39f73a65d37ec49
-
SSDEEP
6144:8idBBBsj84TcfmJNvqNuxdoyw6HWT1uPnCFIv8uOpjMWYYubRJjp03rrHA/APAxL:8idBBV8HolsnC6EUjEOAIdwum+
Static task
static1
Behavioral task
behavioral1
Sample
Umbral.bat
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1315812787699585118/w2lqDrVQqtFwk0uhRh-_CNIYMagyoPfqPEpCtbHgfK7cFpwIVOyIa3juwBy7vnR8Bh0g
Targets
-
-
Target
Umbral.bat
-
Size
387KB
-
MD5
1e183c2ada7d55a0ccf510721415d5bc
-
SHA1
fdf973e881b0999cfde6e1a4404e0a14fba53aab
-
SHA256
5c857070215559b9e49212029a3ae61eb292347f527ba4b2f8f602eaae003654
-
SHA512
4b1a3f2e91b01468c219650e8c685bc197cb0fe2907c71db073b4a59d2cfdc91ed7975c1af01de5aed89fa59dd2b17785777e57653b896a4a39f73a65d37ec49
-
SSDEEP
6144:8idBBBsj84TcfmJNvqNuxdoyw6HWT1uPnCFIv8uOpjMWYYubRJjp03rrHA/APAxL:8idBBV8HolsnC6EUjEOAIdwum+
-
Detect Umbral payload
-
Umbral family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-