Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
829fb38be0b18e34559c55621008881b6a1b351f48fcdbc04624cc653e7c7222
-
Size
230KB
-
Sample
250122-evhvdayldr
-
MD5
c1f2ad8d6163d06adab04c985b8d5e2c
-
SHA1
2ff7f7a1feb743fccb19cd64611322a4facb1a8a
-
SHA256
829fb38be0b18e34559c55621008881b6a1b351f48fcdbc04624cc653e7c7222
-
SHA512
ffb31ff8fba0668aaec44cd0c64519265cb7be7a758268dae067927a92e7f1589b1b3a0d3147264f699684c04a71236daa80e5ade2caf7e4ac5affe334870cfb
-
SSDEEP
6144:VloZM+rIkd8g+EtXHkv/iD4l3RLJX8Qf0+nJUg1zjb8e1mC1Ni:3oZtL+EP8l3RLJX8Qf0+nJUg1zZE
Behavioral task
behavioral1
Sample
829fb38be0b18e34559c55621008881b6a1b351f48fcdbc04624cc653e7c7222.exe
Resource
win7-20241010-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1330136291467198504/z4TJmlqFrtMxFwlpKFihKwDbDGhZT1qsCllMCDcaIgfd02TNv5UbR1vAyt5neO55hFG1
Targets
-
-
Target
829fb38be0b18e34559c55621008881b6a1b351f48fcdbc04624cc653e7c7222
-
Size
230KB
-
MD5
c1f2ad8d6163d06adab04c985b8d5e2c
-
SHA1
2ff7f7a1feb743fccb19cd64611322a4facb1a8a
-
SHA256
829fb38be0b18e34559c55621008881b6a1b351f48fcdbc04624cc653e7c7222
-
SHA512
ffb31ff8fba0668aaec44cd0c64519265cb7be7a758268dae067927a92e7f1589b1b3a0d3147264f699684c04a71236daa80e5ade2caf7e4ac5affe334870cfb
-
SSDEEP
6144:VloZM+rIkd8g+EtXHkv/iD4l3RLJX8Qf0+nJUg1zjb8e1mC1Ni:3oZtL+EP8l3RLJX8Qf0+nJUg1zZE
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1