General
-
Target
UltimaExecutorV.1.8.exe
-
Size
911KB
-
Sample
250415-cgjteawpw4
-
MD5
c1d3eba922b1c8200c576741321e30f0
-
SHA1
992b40e1883a7f034b99256084aa0130d738ba5c
-
SHA256
2257c78940e11aab5b71fd84da526e53a7d86c217667b42bc29f837e8ea09eb7
-
SHA512
cbebcc57d691cb0a42ea345aa296e6e7ca52ad09e049e1e951f56415dd657ebbe69a7ed8e0ed41cdea40e7c82d579579457af9374cbcf718fa9bf0c6a777c224
-
SSDEEP
24576:PX0dNTiM8RviVUwblP373RVTdQJtg8y6E:/0dNTiM8NiVUC373RheE
Static task
static1
Malware Config
Targets
-
-
Target
UltimaExecutorV.1.8.exe
-
Size
911KB
-
MD5
c1d3eba922b1c8200c576741321e30f0
-
SHA1
992b40e1883a7f034b99256084aa0130d738ba5c
-
SHA256
2257c78940e11aab5b71fd84da526e53a7d86c217667b42bc29f837e8ea09eb7
-
SHA512
cbebcc57d691cb0a42ea345aa296e6e7ca52ad09e049e1e951f56415dd657ebbe69a7ed8e0ed41cdea40e7c82d579579457af9374cbcf718fa9bf0c6a777c224
-
SSDEEP
24576:PX0dNTiM8RviVUwblP373RVTdQJtg8y6E:/0dNTiM8NiVUC373RheE
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1