General
-
Target
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe
-
Size
257KB
-
Sample
250113-gv3kwssjgn
-
MD5
c30f9465054f33e6dea1a2ba5cb206e7
-
SHA1
6c2609663a7aa38f738b0104785ab1ba469af013
-
SHA256
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53
-
SHA512
181eee666cc26508697e50843ccf55e3c46dad0598b1f493d44f1c6dde8ca84df1d77eaecea0f289386a570d49e9aa2c6daa4b3f617659b092912a22adb6dc0d
-
SSDEEP
6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7so:doZtL+EP8u76SecjfUx1gevPeIqRWjKL
Behavioral task
behavioral1
Sample
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1324414504867467325/ugxr6pCjYDiPPx0dsiHqnLtebwW1baMrpC9h00piLXw8JXyaxiOvmIHCVIVxKMMhKSWQ
Targets
-
-
Target
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe
-
Size
257KB
-
MD5
c30f9465054f33e6dea1a2ba5cb206e7
-
SHA1
6c2609663a7aa38f738b0104785ab1ba469af013
-
SHA256
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53
-
SHA512
181eee666cc26508697e50843ccf55e3c46dad0598b1f493d44f1c6dde8ca84df1d77eaecea0f289386a570d49e9aa2c6daa4b3f617659b092912a22adb6dc0d
-
SSDEEP
6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7so:doZtL+EP8u76SecjfUx1gevPeIqRWjKL
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1