General
-
Target
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN
-
Size
257KB
-
Sample
250112-28q48swqdr
-
MD5
48eccdf62898683d91626bc9ec21c8b0
-
SHA1
05b3f36379d25e8ab6748c57237e950b8ce06b21
-
SHA256
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0a
-
SHA512
ad824674cfabc773d8d50088bc0b01016a6238765079a6e41752b5440c8024aedba0a45242de5969b28b27831a618bc17010f7001cb02e1786461a4b46344285
-
SSDEEP
6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7s:doZtL+EP8u76SecjfUx1gevPeIqRWjK
Behavioral task
behavioral1
Sample
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN.exe
Resource
win7-20241010-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1324414504867467325/ugxr6pCjYDiPPx0dsiHqnLtebwW1baMrpC9h00piLXw8JXyaxiOvmIHCVIVxKMMhKSWQ
Targets
-
-
Target
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN
-
Size
257KB
-
MD5
48eccdf62898683d91626bc9ec21c8b0
-
SHA1
05b3f36379d25e8ab6748c57237e950b8ce06b21
-
SHA256
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0a
-
SHA512
ad824674cfabc773d8d50088bc0b01016a6238765079a6e41752b5440c8024aedba0a45242de5969b28b27831a618bc17010f7001cb02e1786461a4b46344285
-
SSDEEP
6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7s:doZtL+EP8u76SecjfUx1gevPeIqRWjK
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1