Resubmissions

16-11-2023 14:41

231116-r2taxacd86 10

General

  • Target

    Chad Manager (QUEST).exe

  • Size

    362KB

  • Sample

    231116-r2taxacd86

  • MD5

    cca5bab38fe75d3683b7355f1084007a

  • SHA1

    c2f0c7ffd1cf73c0f2f4a6c881150e1cb78288c0

  • SHA256

    d57da5841f0117edb2cd41d92c03de6385bbe69563abbcd902b8e09a111824e8

  • SHA512

    afe550e0007e76483c84cf3d9c0341240f45d715bbb192fa04aa0ab55e7baf8cb2a0332267869a123c846cd1389ed060dfaec7ea8d40b6110f234965436b7fd9

  • SSDEEP

    6144:PcyHIGadsUS0O3ulKjb8eNHOJZCDv4zMYAU:Pc+IG9/jR

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1099530385500672010/v1L-vI2_V9Aqx-ynFN75S3tPemD4r2wKTC9J6RMsGD49q8zKhKwCqt6KEOb5mbuKSV1A

Targets

    • Target

      Chad Manager (QUEST).exe

    • Size

      362KB

    • MD5

      cca5bab38fe75d3683b7355f1084007a

    • SHA1

      c2f0c7ffd1cf73c0f2f4a6c881150e1cb78288c0

    • SHA256

      d57da5841f0117edb2cd41d92c03de6385bbe69563abbcd902b8e09a111824e8

    • SHA512

      afe550e0007e76483c84cf3d9c0341240f45d715bbb192fa04aa0ab55e7baf8cb2a0332267869a123c846cd1389ed060dfaec7ea8d40b6110f234965436b7fd9

    • SSDEEP

      6144:PcyHIGadsUS0O3ulKjb8eNHOJZCDv4zMYAU:Pc+IG9/jR

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks