General
-
Target
GTAKiddionsModdestMenu.exe
-
Size
760KB
-
Sample
250415-hvbb3stvgy
-
MD5
eb423c6dc0da5974cb5dbbc694cdeb04
-
SHA1
cd0a59826f3283d611ec033235fbbe2fc8f127b7
-
SHA256
5a1dfadc21abdb14962162b1f82b57da371f86baddf890420b252f821dff2699
-
SHA512
f8fb1a032a44d809aff2d42a776978e9dc99117f20654aee3c51565378de0ba790995925934aa72787799aff29666c2da9dd655c9c400af3509a9f8209616e87
-
SSDEEP
12288:5jH1hK3ikszq3iNWu6GQzR2ERfm/L5ZQinoF0jJJ3HeCSCwaAt:5T1h+i1myNWujo++
Static task
static1
Malware Config
Targets
-
-
Target
GTAKiddionsModdestMenu.exe
-
Size
760KB
-
MD5
eb423c6dc0da5974cb5dbbc694cdeb04
-
SHA1
cd0a59826f3283d611ec033235fbbe2fc8f127b7
-
SHA256
5a1dfadc21abdb14962162b1f82b57da371f86baddf890420b252f821dff2699
-
SHA512
f8fb1a032a44d809aff2d42a776978e9dc99117f20654aee3c51565378de0ba790995925934aa72787799aff29666c2da9dd655c9c400af3509a9f8209616e87
-
SSDEEP
12288:5jH1hK3ikszq3iNWu6GQzR2ERfm/L5ZQinoF0jJJ3HeCSCwaAt:5T1h+i1myNWujo++
-
Detect Umbral payload
-
Umbral family
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1