General
-
Target
01a6455f4129f57c14f06015e35574ed431d9d003bdd28a842f6363a227ed21e.exe
-
Size
231KB
-
Sample
250116-drfp6szpfr
-
MD5
302d470d77ea2d4d630c24a0ae972dfa
-
SHA1
ee69fc69148e3975c5bac47c9adb9a54b23b0e72
-
SHA256
01a6455f4129f57c14f06015e35574ed431d9d003bdd28a842f6363a227ed21e
-
SHA512
0f4d1b7a46233e63295c8a71559a75c4ed5dd2fb24810fd44f99631d2de72ac902bd1ed9233d5fd0dd76e0c357c49b169ed184a89f6794a48c762e02a7b41f39
-
SSDEEP
6144:RloZM9rIkd8g+EtXHkv/iD4vhjKEKtFuYr20VJg1Jb8e1mtia:joZOL+EP8vhjKEKtFuYr20VJgPra
Behavioral task
behavioral1
Sample
01a6455f4129f57c14f06015e35574ed431d9d003bdd28a842f6363a227ed21e.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1327206784108068875/wzjvx_5jjHa7l3Jym0vEqbJGwBZ_PiZ2-3fjL-iIU9GxWktZs0oQfJSna-a2M5Mce2pb
Targets
-
-
Target
01a6455f4129f57c14f06015e35574ed431d9d003bdd28a842f6363a227ed21e.exe
-
Size
231KB
-
MD5
302d470d77ea2d4d630c24a0ae972dfa
-
SHA1
ee69fc69148e3975c5bac47c9adb9a54b23b0e72
-
SHA256
01a6455f4129f57c14f06015e35574ed431d9d003bdd28a842f6363a227ed21e
-
SHA512
0f4d1b7a46233e63295c8a71559a75c4ed5dd2fb24810fd44f99631d2de72ac902bd1ed9233d5fd0dd76e0c357c49b169ed184a89f6794a48c762e02a7b41f39
-
SSDEEP
6144:RloZM9rIkd8g+EtXHkv/iD4vhjKEKtFuYr20VJg1Jb8e1mtia:joZOL+EP8vhjKEKtFuYr20VJgPra
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1