General
-
Target
9dd8fd176fb68406cc8583758079935679f8e3bc66edf6e99e54d47ab10df19e
-
Size
223KB
-
Sample
250214-ll52wa1qam
-
MD5
7d73f9c553da7faac22c7e42c0d44afe
-
SHA1
f4649f1c94c37282cd322bfffd77e9eeda011453
-
SHA256
9dd8fd176fb68406cc8583758079935679f8e3bc66edf6e99e54d47ab10df19e
-
SHA512
65146ce60624b3de82fe2ffd574660ecfd59a0de2bb1bc9189e483ced11ef7ac7657b2adad706aaf87ceca0e2d61c1b4c826ed7dd337a157762c7b8e33dfdf1f
-
SSDEEP
6144:SloZMNrIkd8g+EtXHkv/iD4k8gP9K8euZRi:8oZmL+EP8k97I
Behavioral task
behavioral1
Sample
9dd8fd176fb68406cc8583758079935679f8e3bc66edf6e99e54d47ab10df19e.exe
Resource
win7-20250207-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1338553309606449233/Pl_QDkoeMvQrO-r8gCVSOQXtmf-Bb4ucaQIJ7gyLAdkULy17nwpz7umpTStVgteA_jAt
Targets
-
-
Target
9dd8fd176fb68406cc8583758079935679f8e3bc66edf6e99e54d47ab10df19e
-
Size
223KB
-
MD5
7d73f9c553da7faac22c7e42c0d44afe
-
SHA1
f4649f1c94c37282cd322bfffd77e9eeda011453
-
SHA256
9dd8fd176fb68406cc8583758079935679f8e3bc66edf6e99e54d47ab10df19e
-
SHA512
65146ce60624b3de82fe2ffd574660ecfd59a0de2bb1bc9189e483ced11ef7ac7657b2adad706aaf87ceca0e2d61c1b4c826ed7dd337a157762c7b8e33dfdf1f
-
SSDEEP
6144:SloZMNrIkd8g+EtXHkv/iD4k8gP9K8euZRi:8oZmL+EP8k97I
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1