General
-
Target
Everything-1.4.1.1026.x64-Setup2.exe
-
Size
468KB
-
Sample
250411-ndjj1sxtdy
-
MD5
53e560338b0fabac1c89e7baf950046d
-
SHA1
517c82342d0e5ee0a581ff0db0e543c9cb9986a4
-
SHA256
c9d2459c5bd3e5044d4d625f92e30bfa475e11fe259fc00c0d4961f5ebe10f3b
-
SHA512
4216abf6d385c3f37889300dd9c8ec98215e7f8810806b2a306cd6e79747c720972b74026917ed5cc9a07e8c677aed2ad2ffc509290853eaa0ec4bc807a3843d
-
SSDEEP
12288:hGePVle8y4TKs/u6oZtL+EP855eLcCFdW8j+ctBIX0B:oITKoI8XeLcCFdW8j+ctBIXo
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1360210646112665720/qXg1qF4JZ6j3Rqqts-_rZSbjGedO1RuAq7HLooe-TstGKKIib9a91A7sjYj3Xa-Dhtsc
Targets
-
-
Target
Everything-1.4.1.1026.x64-Setup2.exe
-
Size
468KB
-
MD5
53e560338b0fabac1c89e7baf950046d
-
SHA1
517c82342d0e5ee0a581ff0db0e543c9cb9986a4
-
SHA256
c9d2459c5bd3e5044d4d625f92e30bfa475e11fe259fc00c0d4961f5ebe10f3b
-
SHA512
4216abf6d385c3f37889300dd9c8ec98215e7f8810806b2a306cd6e79747c720972b74026917ed5cc9a07e8c677aed2ad2ffc509290853eaa0ec4bc807a3843d
-
SSDEEP
12288:hGePVle8y4TKs/u6oZtL+EP855eLcCFdW8j+ctBIX0B:oITKoI8XeLcCFdW8j+ctBIXo
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1