General
-
Target
Bypass.zip
-
Size
20.0MB
-
Sample
250212-ywry8axpet
-
MD5
5ad10d91117eb1f1eee86057bcf7ee2f
-
SHA1
2244bce5518457e698393b0d190231a54abff53f
-
SHA256
d9ada8ac28044e1c6afe45155c9921fdd8751c11a28c549fb40ba5e09d703b1b
-
SHA512
fa15a451c848427576c008ce404740008235788f1fbc80a8ff66bbc371b8b7651da93892a9e5b4581c92d85508f492222769cb1bd6fb88b8362c63cd1603fab0
-
SSDEEP
393216:hGvzMGKSPAYRZxLeFp2ecaO1aEbbL8xtHxG1AdTB4+PR+NByZ/O:woGKSY46F1caK1oHEIT4cZ2
Static task
static1
Behavioral task
behavioral1
Sample
Bypass.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral2
Sample
Bypass.exe
Resource
win11-20250211-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1339207974182191194/Cbspp1D1YgKvkqPsxxLAOiahYoeW0ceIteSYlYtjG202TSZnR-Kj6vR7I8pJsgFtUunb
Targets
-
-
Target
Bypass.exe
-
Size
29.5MB
-
MD5
f7ef6fba8a48795d3211c342724a30cf
-
SHA1
e7aec94670a4bbc40c028dafe2f853316cb81d98
-
SHA256
d565ef55607fbdf1e514153f7e510e6cc76d8c7e8f6530c9af368fb26d797e5d
-
SHA512
558e6c626869a9d4f9125acb7623136cbc33b2187dfe44dd3b98a563022efdf90b3e8966a3088c27c5e0ad48a149edd3e447f5e561729b9c726aebb0e801c013
-
SSDEEP
393216:DY1XgMKAniEvbT3+vvIIAwEPE63FhOvRpr2NKl5/iGVtK7rCcd/:8GMKAiWOv5AwoLipSQ5oOc5
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Umbral payload
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Modifies Windows Defender Real-time Protection settings
-
Umbral family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1