General
-
Target
tempfixed.exe
-
Size
945KB
-
Sample
250412-vd9jrsyls2
-
MD5
643ea9f09b2a1569d837e3ed4df1cde3
-
SHA1
49cfb0d2624c1e21505f29ccb3dd84fe760f36bf
-
SHA256
8a5df02a019f735361db01e5236473ef17cbbcb4843d2fd9f1d35fb6056a2333
-
SHA512
8a46f9d86486acbed1ab277bcb730693c215e2932f84a512d327bda77cd539bcd48d119278817439c4d4762d0ca83de94c05dd242cb59d478fbc9eb4f0a0241c
-
SSDEEP
24576:f+rGtLxxYkWKYqJYmbb0bxpi2OsDVp2f0/NLTq+avT4BcCi:WGtDYkWezvYxZpp2f0/NLTq+avT4BcCi
Static task
static1
Behavioral task
behavioral1
Sample
tempfixed.exe
Resource
win10ltsc2021-20250410-en
Malware Config
Targets
-
-
Target
tempfixed.exe
-
Size
945KB
-
MD5
643ea9f09b2a1569d837e3ed4df1cde3
-
SHA1
49cfb0d2624c1e21505f29ccb3dd84fe760f36bf
-
SHA256
8a5df02a019f735361db01e5236473ef17cbbcb4843d2fd9f1d35fb6056a2333
-
SHA512
8a46f9d86486acbed1ab277bcb730693c215e2932f84a512d327bda77cd539bcd48d119278817439c4d4762d0ca83de94c05dd242cb59d478fbc9eb4f0a0241c
-
SSDEEP
24576:f+rGtLxxYkWKYqJYmbb0bxpi2OsDVp2f0/NLTq+avT4BcCi:WGtDYkWezvYxZpp2f0/NLTq+avT4BcCi
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-