General
-
Target
a47429f5154f3004736a632274f3f39ef307a44d7f0f65feac008085ffa9d2a6.exe
-
Size
231KB
-
Sample
250116-axfetaskgw
-
MD5
d4614e3b2357a4cd0b0b8c4193d10fda
-
SHA1
774af912c6d7685175ad069f22848d72d0dab03b
-
SHA256
a47429f5154f3004736a632274f3f39ef307a44d7f0f65feac008085ffa9d2a6
-
SHA512
39b4c4a02b58ad825277843e4ca7492f35b14e90ac32f60b9f9caecfe348598a8d836bae9b138661cf66ddb3cc45d6fb668733363a55bac818342b37a1fdfd69
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4+Ocip3cw/oeHp0AVO0b8e1mMiq:DoZtL+EP8+Ocip3cw/oeHp0AVjiq
Behavioral task
behavioral1
Sample
a47429f5154f3004736a632274f3f39ef307a44d7f0f65feac008085ffa9d2a6.exe
Resource
win7-20240729-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1326652489054818346/f_cBTMEYAkXYcTbEkW-MUwYrefMORTfuoofsZ5ymJ5yR8BQpohmaCuB-PwAuIP1xAUKw
Targets
-
-
Target
a47429f5154f3004736a632274f3f39ef307a44d7f0f65feac008085ffa9d2a6.exe
-
Size
231KB
-
MD5
d4614e3b2357a4cd0b0b8c4193d10fda
-
SHA1
774af912c6d7685175ad069f22848d72d0dab03b
-
SHA256
a47429f5154f3004736a632274f3f39ef307a44d7f0f65feac008085ffa9d2a6
-
SHA512
39b4c4a02b58ad825277843e4ca7492f35b14e90ac32f60b9f9caecfe348598a8d836bae9b138661cf66ddb3cc45d6fb668733363a55bac818342b37a1fdfd69
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4+Ocip3cw/oeHp0AVO0b8e1mMiq:DoZtL+EP8+Ocip3cw/oeHp0AVjiq
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1