General
-
Target
Best.exe
-
Size
2.6MB
-
Sample
250222-y2mxfsxkdw
-
MD5
ffbd4856b9514f0db9d1f06f51060dd2
-
SHA1
86a0418a6672754326fe146e68b2db56eae01710
-
SHA256
be51fb720bcc14fbce1a3360295390290d99921216acc8979fd64e85fa5afff0
-
SHA512
dc66c8607aec4390f882e796ed8936038cd9db230cf9ce2c5c9779c225b427afe56a593a7c7c0a96657e9d12da1f79da48f3b2ea4c2ee052f1e213bc61b6144a
-
SSDEEP
49152:PVxkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+PT:9E+YplNwGyNm3Z/x0wCX
Static task
static1
Behavioral task
behavioral1
Sample
Best.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1342855344006893599/eGKFdFfxqqBAzE_z6yEX9OgSrXGjaARgvdEHtEpFWiqqlvMfgcnXVTQiOS26Pz1o69fo
Targets
-
-
Target
Best.exe
-
Size
2.6MB
-
MD5
ffbd4856b9514f0db9d1f06f51060dd2
-
SHA1
86a0418a6672754326fe146e68b2db56eae01710
-
SHA256
be51fb720bcc14fbce1a3360295390290d99921216acc8979fd64e85fa5afff0
-
SHA512
dc66c8607aec4390f882e796ed8936038cd9db230cf9ce2c5c9779c225b427afe56a593a7c7c0a96657e9d12da1f79da48f3b2ea4c2ee052f1e213bc61b6144a
-
SSDEEP
49152:PVxkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+PT:9E+YplNwGyNm3Z/x0wCX
Score10/10-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-