General
-
Target
download.exe_
-
Size
290KB
-
Sample
250324-tw3y9sswgv
-
MD5
244360e3e1f45bf12f428ea3846d2b8a
-
SHA1
188e9b7018e2dac9beb3b2bfdbeae98dfb9e9978
-
SHA256
3d5619f53fac5d324a867e69fd61c51a54ad1d3d28a998f3b85f78598703dcac
-
SHA512
65157507e439c91b8b67c895f962d8e780cfaf8638bd4827cac72abc06b7cbd613373193782c55f58b377d85bc545f2bcd11e4b0c22e677f162bb34d772203ab
-
SSDEEP
6144:Fuq1IOhVlGyWxgf4w+EowI7kwC6Snw8d9:Fuq1IMlGynfd+EAjC6Swi
Static task
static1
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
download.exe_
-
Size
290KB
-
MD5
244360e3e1f45bf12f428ea3846d2b8a
-
SHA1
188e9b7018e2dac9beb3b2bfdbeae98dfb9e9978
-
SHA256
3d5619f53fac5d324a867e69fd61c51a54ad1d3d28a998f3b85f78598703dcac
-
SHA512
65157507e439c91b8b67c895f962d8e780cfaf8638bd4827cac72abc06b7cbd613373193782c55f58b377d85bc545f2bcd11e4b0c22e677f162bb34d772203ab
-
SSDEEP
6144:Fuq1IOhVlGyWxgf4w+EowI7kwC6Snw8d9:Fuq1IMlGynfd+EAjC6Swi
-
Detect Umbral payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-