General
-
Target
Nemezida.exe
-
Size
231KB
-
Sample
250411-w7zgbsxsev
-
MD5
18bc878dd9de70a6e96dc283aaa986bd
-
SHA1
cfaeee2d1e1f02690568ffa22d1be955cc318808
-
SHA256
e8cba28d07b08b7267d7430bb1beea11634d76d549f2056e362b14871f645c66
-
SHA512
af3040a2e2da1330b6821bb0cc59962a60095d1c7af5854e9c409225ce032946dfaee6a3bd35cfc3b584315398801e5ccc0601b3e0fdb49216f6e35f28888c23
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4cZO/GELnsGd42X3WfEb8e1mpi:DoZtL+EP8cZO/GELnsGd42X3W8b
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1360276909551915029/lC-vw7kRiqutkehNUDibMCgd2Hd6PFiq86JSv2ugXDPC7_FGRYRy6t4EL1s_Fy6LAyD6
Targets
-
-
Target
Nemezida.exe
-
Size
231KB
-
MD5
18bc878dd9de70a6e96dc283aaa986bd
-
SHA1
cfaeee2d1e1f02690568ffa22d1be955cc318808
-
SHA256
e8cba28d07b08b7267d7430bb1beea11634d76d549f2056e362b14871f645c66
-
SHA512
af3040a2e2da1330b6821bb0cc59962a60095d1c7af5854e9c409225ce032946dfaee6a3bd35cfc3b584315398801e5ccc0601b3e0fdb49216f6e35f28888c23
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4cZO/GELnsGd42X3WfEb8e1mpi:DoZtL+EP8cZO/GELnsGd42X3W8b
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1