General
-
Target
Umbra1l.bin
-
Size
229KB
-
Sample
250202-tmhxqs1lhp
-
MD5
d4b3962331fd69d60450d4bf2a4e082d
-
SHA1
e0f0a331505e6a6d33886a450365d1412d34ba19
-
SHA256
6a426a8c30989c1f079a3d13b675eb1cd0c888d353a97e0233c8786fb3c2ab86
-
SHA512
1273506c488bec41bb3e7da428825a7d39d067a25de8b52a8408623614cdc8894b4a3cfaf1004ec686ceae647224ef3b9021149303b76b5b1266103e6ac0f200
-
SSDEEP
6144:tloZMmrIkd8g+EtXHkv/iD44zOjlTwk7diTlwsJgbb8e1mci:voZ1L+EP84zOjlTwk7diTlwsJim
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1335641981073756170/seSOvsSZqaqoC5zgxEHDiCcOuEtW37kL715-jtQomsdu_hU2kpn5cf3wo-E3CcPUcXb9
Targets
-
-
Target
Umbra1l.bin
-
Size
229KB
-
MD5
d4b3962331fd69d60450d4bf2a4e082d
-
SHA1
e0f0a331505e6a6d33886a450365d1412d34ba19
-
SHA256
6a426a8c30989c1f079a3d13b675eb1cd0c888d353a97e0233c8786fb3c2ab86
-
SHA512
1273506c488bec41bb3e7da428825a7d39d067a25de8b52a8408623614cdc8894b4a3cfaf1004ec686ceae647224ef3b9021149303b76b5b1266103e6ac0f200
-
SSDEEP
6144:tloZMmrIkd8g+EtXHkv/iD44zOjlTwk7diTlwsJgbb8e1mci:voZ1L+EP84zOjlTwk7diTlwsJim
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-