General
-
Target
Rich Executor.exe
-
Size
285KB
-
Sample
250115-3fa3zszla1
-
MD5
16784b440d687c01015d992d63908bf8
-
SHA1
49f6cd11f32f093329e8fde5d710c3fbe41f3c7d
-
SHA256
da9b33d28f4984317ffacf61df2b1b975e09babbec5c7ef8d0ec91ad3eb810f9
-
SHA512
d29bda5ab0b4e62a263eb77a76081e705624f2a93c2d1f7730805df409777f3eaaea6673b65e45f3e63b0f3e56bc7938a861685e6b73452097e371022eff981f
-
SSDEEP
6144:6loZM+rIkd8g+EtXHkv/iD4xiNArRiK1XwBzOurfkb8e1m9izE2HV:EoZtL+EP8xiNArRiK1XwBzOurM79
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1329227551364612146/MjioVS6yEMfAvkJskGFnyiqY37leOjW-uiXtsO-NePquHCaIszfgCydv7LuhTZDCijFh
Targets
-
-
Target
Rich Executor.exe
-
Size
285KB
-
MD5
16784b440d687c01015d992d63908bf8
-
SHA1
49f6cd11f32f093329e8fde5d710c3fbe41f3c7d
-
SHA256
da9b33d28f4984317ffacf61df2b1b975e09babbec5c7ef8d0ec91ad3eb810f9
-
SHA512
d29bda5ab0b4e62a263eb77a76081e705624f2a93c2d1f7730805df409777f3eaaea6673b65e45f3e63b0f3e56bc7938a861685e6b73452097e371022eff981f
-
SSDEEP
6144:6loZM+rIkd8g+EtXHkv/iD4xiNArRiK1XwBzOurfkb8e1m9izE2HV:EoZtL+EP8xiNArRiK1XwBzOurM79
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1