General

  • Target

    NEAS.0aece04789b6892b13e1985bb08a7200.exe

  • Size

    278KB

  • Sample

    231111-a69d9adb48

  • MD5

    0aece04789b6892b13e1985bb08a7200

  • SHA1

    49339cc3e987f517ab8ec2e6cb1baa19fbbc675f

  • SHA256

    a6c6b2a4d581d6f5f1e661b0d0e390107ea79a7075700e48cfe41442c1e2eb06

  • SHA512

    4d15c6bfd7c32f34fbbbb63cb4e974cd6f0d45f8f42605c4778cfb6dfccf527fa668717f70d955784e46899815a7a030cbe48616c0b93fe1825e80dfd5ca8b9d

  • SSDEEP

    6144:pLGrA0UloZM9rIkd8g+EtXHkv/iD4ZZACl98e1mbix:eA0SoZOL+EP8h7n

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1170536634891128902/hdNxkvpSxRXfW2ouud2imDE8eFbcAfoi3fBBxpcoRyxI8E-rxHT7NHLuI-Q-ThYq7M3H

Targets

    • Target

      NEAS.0aece04789b6892b13e1985bb08a7200.exe

    • Size

      278KB

    • MD5

      0aece04789b6892b13e1985bb08a7200

    • SHA1

      49339cc3e987f517ab8ec2e6cb1baa19fbbc675f

    • SHA256

      a6c6b2a4d581d6f5f1e661b0d0e390107ea79a7075700e48cfe41442c1e2eb06

    • SHA512

      4d15c6bfd7c32f34fbbbb63cb4e974cd6f0d45f8f42605c4778cfb6dfccf527fa668717f70d955784e46899815a7a030cbe48616c0b93fe1825e80dfd5ca8b9d

    • SSDEEP

      6144:pLGrA0UloZM9rIkd8g+EtXHkv/iD4ZZACl98e1mbix:eA0SoZOL+EP8h7n

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks