General

  • Target

    ExodusMiner.exe

  • Size

    229KB

  • Sample

    240211-yljj4ada32

  • MD5

    610f270e3e1354a9e9cf73268e6d3835

  • SHA1

    a5cbce545de815e3ff3ed7e2a74deb7dc059d85e

  • SHA256

    3abc7ea28aaa722243f21aa1f31ea191961e91babe16432c69fbb413d8b9e924

  • SHA512

    0ec59177be33aa54033b6f3081200500aa63e11c7df6990db9360f3d044ecd3ffb3d51370967c1e16fac03284e092cfd9bc41e04c9e76f953f786a1a54e9c55a

  • SSDEEP

    6144:dloZMPrIkd8g+EtXHkv/iD4jrwQjpaC9lop7mGzOfdb8e1mtdi:/oZIL+EP8jrwQjpaC9lop7mGzO1M0

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1205845501723811940/_aoOhJY0iv9RK-gjJERpdLz95KQLHziIrC0GV03Ze55mYrNXD8Z0d2Kd6p_x2j4rPiad

Targets

    • Target

      ExodusMiner.exe

    • Size

      229KB

    • MD5

      610f270e3e1354a9e9cf73268e6d3835

    • SHA1

      a5cbce545de815e3ff3ed7e2a74deb7dc059d85e

    • SHA256

      3abc7ea28aaa722243f21aa1f31ea191961e91babe16432c69fbb413d8b9e924

    • SHA512

      0ec59177be33aa54033b6f3081200500aa63e11c7df6990db9360f3d044ecd3ffb3d51370967c1e16fac03284e092cfd9bc41e04c9e76f953f786a1a54e9c55a

    • SSDEEP

      6144:dloZMPrIkd8g+EtXHkv/iD4jrwQjpaC9lop7mGzOfdb8e1mtdi:/oZIL+EP8jrwQjpaC9lop7mGzO1M0

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks