General
-
Target
3462387ca29f4536b4c7828ed6bc6ff8bc86fed3eef2ea6cc8650ff7d437b04b.exe
-
Size
231KB
-
Sample
250124-243x8svlhj
-
MD5
ff3be52f8463ba850787640f729bd887
-
SHA1
b4218156fce36677545852910612eab5630dc291
-
SHA256
3462387ca29f4536b4c7828ed6bc6ff8bc86fed3eef2ea6cc8650ff7d437b04b
-
SHA512
69cdbaea4662a68cd03ff9611dee9593ac7262930252a600bd9da44e8e3b46a41578630e6eb23223157c1f93e5a19c64b3beac0ed4006b0e68f5af753d5ee471
-
SSDEEP
6144:xloZMffsXtioRkts/cnnK6cMltMMjw2xpaBPyAxVkElb8e1mhzLHi2:DoZdtlRk83MltMMjw2xpaBPyAxVkAMW2
Behavioral task
behavioral1
Sample
3462387ca29f4536b4c7828ed6bc6ff8bc86fed3eef2ea6cc8650ff7d437b04b.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1326983350606368888/6nNwZ_BPeT1GIaRGLO0xQj2DsvnMBNSzwMGZo-Zz-1rTdrKUSQ9WCgqpApFmFqKixfL1
Targets
-
-
Target
3462387ca29f4536b4c7828ed6bc6ff8bc86fed3eef2ea6cc8650ff7d437b04b.exe
-
Size
231KB
-
MD5
ff3be52f8463ba850787640f729bd887
-
SHA1
b4218156fce36677545852910612eab5630dc291
-
SHA256
3462387ca29f4536b4c7828ed6bc6ff8bc86fed3eef2ea6cc8650ff7d437b04b
-
SHA512
69cdbaea4662a68cd03ff9611dee9593ac7262930252a600bd9da44e8e3b46a41578630e6eb23223157c1f93e5a19c64b3beac0ed4006b0e68f5af753d5ee471
-
SSDEEP
6144:xloZMffsXtioRkts/cnnK6cMltMMjw2xpaBPyAxVkElb8e1mhzLHi2:DoZdtlRk83MltMMjw2xpaBPyAxVkAMW2
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-