General

  • Target

    ConsoleApplication1_protected.exe

  • Size

    24.9MB

  • Sample

    231105-dsgnvscb79

  • MD5

    c79c2a913c7dac3db3567375a7643cfc

  • SHA1

    fa76240f3722352c6598d3992c95cac12dca53c8

  • SHA256

    35e27fd1445c11bcceede5059823629f428058d70d182dffc4d02ce0a5a5ae41

  • SHA512

    990c0f24ba3a96ec21b16b2ce3f9870b4d8fc70a35f66af14b2ca6619545e276a24e5bbb21545befa9e96283e5be07c6481fac24378c6b8257d23105a718b05a

  • SSDEEP

    393216:ZRM3IIVoIhlU9KTC+DMo1UoLEc6+0A65dcbyReDhWARlH7ptR3VeWc8CZkoU:ZS3VoRVNoIcsR5djeDhpRlH7fRIRrk5

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1170536634891128902/hdNxkvpSxRXfW2ouud2imDE8eFbcAfoi3fBBxpcoRyxI8E-rxHT7NHLuI-Q-ThYq7M3H

Targets

    • Target

      ConsoleApplication1_protected.exe

    • Size

      24.9MB

    • MD5

      c79c2a913c7dac3db3567375a7643cfc

    • SHA1

      fa76240f3722352c6598d3992c95cac12dca53c8

    • SHA256

      35e27fd1445c11bcceede5059823629f428058d70d182dffc4d02ce0a5a5ae41

    • SHA512

      990c0f24ba3a96ec21b16b2ce3f9870b4d8fc70a35f66af14b2ca6619545e276a24e5bbb21545befa9e96283e5be07c6481fac24378c6b8257d23105a718b05a

    • SSDEEP

      393216:ZRM3IIVoIhlU9KTC+DMo1UoLEc6+0A65dcbyReDhWARlH7ptR3VeWc8CZkoU:ZS3VoRVNoIcsR5djeDhpRlH7fRIRrk5

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks