General
-
Target
1231235612.exe
-
Size
227KB
-
Sample
250207-wsgmzasphj
-
MD5
23d58f88b771bdc8e26f4f3035672b31
-
SHA1
83a59396d0efd33ec5922dfbdfce637bcaeb55ee
-
SHA256
c4ce9927512cf2b43f9368a187ee8ac9b54b683afbc143979e66f369929b1c79
-
SHA512
87e5de99a92d49df963777ceb6bd317a7d409d036b7ec979f14ac1e5e683a95dbac9cde088e7ef660f8d835dbd530d6dd984b67e437e96ae31362f0b4bf0fd5b
-
SSDEEP
6144:eloZM9rIkd8g+EtXHkv/iD44c02GELns/d42X3Wl5jb8e1mXi:IoZOL+EP84c02GELns/d42X3WrR
Behavioral task
behavioral1
Sample
1231235612.exe
Resource
win7-20241010-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1337485677910036490/JnRKXNGEcjRRa3DhZoU21ouJCDcOeDiahxMYg5fVWC5McNXJhHE-C6sVGuJsj5kTAmK2
Targets
-
-
Target
1231235612.exe
-
Size
227KB
-
MD5
23d58f88b771bdc8e26f4f3035672b31
-
SHA1
83a59396d0efd33ec5922dfbdfce637bcaeb55ee
-
SHA256
c4ce9927512cf2b43f9368a187ee8ac9b54b683afbc143979e66f369929b1c79
-
SHA512
87e5de99a92d49df963777ceb6bd317a7d409d036b7ec979f14ac1e5e683a95dbac9cde088e7ef660f8d835dbd530d6dd984b67e437e96ae31362f0b4bf0fd5b
-
SSDEEP
6144:eloZM9rIkd8g+EtXHkv/iD44c02GELns/d42X3Wl5jb8e1mXi:IoZOL+EP84c02GELns/d42X3WrR
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1