General
-
Target
nigga2.bat
-
Size
1KB
-
Sample
250323-2r256ssqs6
-
MD5
06aafbdb0650ecee01c1bdb6b7b51fdb
-
SHA1
ad8c1f0ca620d813ce8e3280139817db583f9c4e
-
SHA256
3b5953d3ea0420345b5c1e9efdbb88ea80bcaa99f2582834c2cd545efa84880c
-
SHA512
039a8ca7db486f7c473a07c22c4269c211fc44175d3fb480eeaf5435df23a70151927940b0bf6a7bbc29b12b1d9a84ab5240686e05cc9daae0d54920d2d84fb9
Static task
static1
Behavioral task
behavioral1
Sample
nigga2.bat
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1346186242164916254/XSGGtSWs1IP-qhWb9F-7vKZ6AbJ1Ah-y8ACFyf9MRP2SkcfW16QzCkiWhzv0YmF7kEXM
Targets
-
-
Target
nigga2.bat
-
Size
1KB
-
MD5
06aafbdb0650ecee01c1bdb6b7b51fdb
-
SHA1
ad8c1f0ca620d813ce8e3280139817db583f9c4e
-
SHA256
3b5953d3ea0420345b5c1e9efdbb88ea80bcaa99f2582834c2cd545efa84880c
-
SHA512
039a8ca7db486f7c473a07c22c4269c211fc44175d3fb480eeaf5435df23a70151927940b0bf6a7bbc29b12b1d9a84ab5240686e05cc9daae0d54920d2d84fb9
-
Detect Umbral payload
-
UAC bypass
-
Umbral family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1