General
-
Target
dsfResult.exe
-
Size
2.3MB
-
Sample
250411-ne7cgaxny8
-
MD5
ca93060ae27c34849c7e65dc0da210fc
-
SHA1
5c589772ee781c45d26b903a5555784ceb8e7e85
-
SHA256
28163caef95204c2ab19d97d52978de33323d65196bd2056c6dc06e15f755eba
-
SHA512
4f9831d35f73b5921d00d5f9693cd46491b692e49a9a30ea85e5710fa11be97f11107db748f25e304564de5a925494ed43eafd576f063f75af342f7809dd4d0e
-
SSDEEP
49152:+4TW5myjkHicujBk84J8bOdiIMYvLl88d971/Ka1yn:+4y5LjkCNjBkN8KA7YvLld99lsn
Behavioral task
behavioral1
Sample
dsfResult.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1360210646112665720/qXg1qF4JZ6j3Rqqts-_rZSbjGedO1RuAq7HLooe-TstGKKIib9a91A7sjYj3Xa-Dhtsc
Targets
-
-
Target
dsfResult.exe
-
Size
2.3MB
-
MD5
ca93060ae27c34849c7e65dc0da210fc
-
SHA1
5c589772ee781c45d26b903a5555784ceb8e7e85
-
SHA256
28163caef95204c2ab19d97d52978de33323d65196bd2056c6dc06e15f755eba
-
SHA512
4f9831d35f73b5921d00d5f9693cd46491b692e49a9a30ea85e5710fa11be97f11107db748f25e304564de5a925494ed43eafd576f063f75af342f7809dd4d0e
-
SSDEEP
49152:+4TW5myjkHicujBk84J8bOdiIMYvLl88d971/Ka1yn:+4y5LjkCNjBkN8KA7YvLld99lsn
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1