General
-
Target
Settings.exe
-
Size
575KB
-
Sample
250404-1bmj4svvet
-
MD5
f6b9a7b049f67e96f3440598b133bfe6
-
SHA1
968116843fe315d8786070a9745c14b5039d415c
-
SHA256
5069f377047dcab276edcf1a759208fcd6723b11dc41a77b0e4ca273a976f699
-
SHA512
235a8b11c6c3274da2cb660e6e6592588779682e82708ba15a8ab71b6ed4df259a9f0f746474d42a0cbb040fe5eb39276d006cb63fbdd51f13d15c64956f46ba
-
SSDEEP
12288:d++zuhAfzEhSFYBSYiMpPU/anILVap192ti/Ajt:nmvhSWNiMVbMaotr
Static task
static1
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1357765742434717747/kDbvfLYHBAGDInmRBSFI2ybqxiaeMAp3iQtloLjdcA7NcBJ1xBLrGexQcyKSOZNwvdMD
Targets
-
-
Target
Settings.exe
-
Size
575KB
-
MD5
f6b9a7b049f67e96f3440598b133bfe6
-
SHA1
968116843fe315d8786070a9745c14b5039d415c
-
SHA256
5069f377047dcab276edcf1a759208fcd6723b11dc41a77b0e4ca273a976f699
-
SHA512
235a8b11c6c3274da2cb660e6e6592588779682e82708ba15a8ab71b6ed4df259a9f0f746474d42a0cbb040fe5eb39276d006cb63fbdd51f13d15c64956f46ba
-
SSDEEP
12288:d++zuhAfzEhSFYBSYiMpPU/anILVap192ti/Ajt:nmvhSWNiMVbMaotr
-
Detect Umbral payload
-
Detect Xworm Payload
-
Revengerat family
-
Umbral family
-
Xworm family
-
RevengeRat Executable
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-