General

  • Target

    RocketTitles.zip

  • Size

    1.5MB

  • Sample

    240503-zg1s9aeg8z

  • MD5

    d19c31a78e19cd8f0205725c32588e94

  • SHA1

    70f1af3d20ba65893b4e12d33018cbaa0111dc28

  • SHA256

    89f9d8a6520ee0021a25420e63acb3cd3f20ba84d321fbb14fe7f990ec020c83

  • SHA512

    c97098ae1b76ce799d329b8bd5e8eacc3d5b6e00f540dbc5dd68b254c42be174021a7a10d7cb7ad7a6d1890b3f890b765672a946e5fa86627f9fdc1f3e248ceb

  • SSDEEP

    24576:vkPAL8N9Bs8YqGyWSBrsp/TyJrR/APhbXXKPhexT9SGANbmMwfS4dQ3t4ME:vkPAL2ZYMYp0BQ2PhexpSGZVK73t3E

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1236047504458518648/JQRxvzCGg9gVDBGAsCh4Y7lt6-VpyZJcpy_w2pc8Qwt0sZVsg3Znypp4Lv0kPFzHxpM9

Targets

    • Target

      RocketTitles.zip

    • Size

      1.5MB

    • MD5

      d19c31a78e19cd8f0205725c32588e94

    • SHA1

      70f1af3d20ba65893b4e12d33018cbaa0111dc28

    • SHA256

      89f9d8a6520ee0021a25420e63acb3cd3f20ba84d321fbb14fe7f990ec020c83

    • SHA512

      c97098ae1b76ce799d329b8bd5e8eacc3d5b6e00f540dbc5dd68b254c42be174021a7a10d7cb7ad7a6d1890b3f890b765672a946e5fa86627f9fdc1f3e248ceb

    • SSDEEP

      24576:vkPAL8N9Bs8YqGyWSBrsp/TyJrR/APhbXXKPhexT9SGANbmMwfS4dQ3t4ME:vkPAL2ZYMYp0BQ2PhexpSGZVK73t3E

    Score
    1/10
    • Target

      Guna.UI2.dll

    • Size

      2.1MB

    • MD5

      c19e9e6a4bc1b668d19505a0437e7f7e

    • SHA1

      73be712aef4baa6e9dabfc237b5c039f62a847fa

    • SHA256

      9ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82

    • SHA512

      b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de

    • SSDEEP

      49152:6QNztBO2+VN7N3HtnPhx70ZO4+CPXOn5PThDH2TBeHjvjiBckYf+Yh/FJ3:6Ahck2z

    Score
    1/10
    • Target

      Newtonsoft.Json.dll

    • Size

      695KB

    • MD5

      195ffb7167db3219b217c4fd439eedd6

    • SHA1

      1e76e6099570ede620b76ed47cf8d03a936d49f8

    • SHA256

      e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

    • SHA512

      56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

    • SSDEEP

      12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/

    Score
    1/10
    • Target

      Newtonsoft.Json.xml

    • Size

      696KB

    • MD5

      d398ffe9fdac6a53a8d8bb26f29bbb3c

    • SHA1

      bffceebb85ca40809e8bcf5941571858e0e0cb31

    • SHA256

      79ee87d4ede8783461de05b93379d576f6e8575d4ab49359f15897a854b643c4

    • SHA512

      7db8aac5ff9b7a202a00d8acebce85df14a7af76b72480921c96b6e01707416596721afa1fa1a9a0563bf528df3436155abc15687b1fee282f30ddcc0ddb9db7

    • SSDEEP

      6144:XqqU+k/Rik5aG0rH3jGHdl0/IdHXpgVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QA:DU1

    Score
    1/10
    • Target

      RocketTitles.exe

    • Size

      464KB

    • MD5

      d01895f1bcb893f652d14a63403d8e99

    • SHA1

      9dd910e9c32719ba86b3b1d9da7d9037c5cfd6d8

    • SHA256

      8269ab6c110238c609466167f327de678c926cb5df8e40355918cd256f2aa59a

    • SHA512

      6cb47c51a823d7683330fa4cbc38315fef10cbd6199b1841a72afaa983093f00e102029bad7bd41d2b4c06d20615dd873f8d7abe62eeb92b58d7f725055dae3c

    • SSDEEP

      12288:27nT0Qq3DUyTfvqCT/4k2QjqGpNBOewDld:2bTUDR3qCr4khqGrUtDld

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • AgentTesla payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Target

      RocketTitles.exe.config

    • Size

      189B

    • MD5

      9dbad5517b46f41dbb0d8780b20ab87e

    • SHA1

      ef6aef0b1ea5d01b6e088a8bf2f429773c04ba5e

    • SHA256

      47e5a0f101af4151d7f13d2d6bfa9b847d5b5e4a98d1f4674b7c015772746cdf

    • SHA512

      43825f5c26c54e1fc5bffcce30caad1449a28c0c9a9432e9ce17d255f8bf6057c1a1002d9471e5b654ab1de08fb6eabf96302cdb3e0fb4b63ba0ff186e903be8

    Score
    3/10
    • Target

      RocketTitles.pdb

    • Size

      177KB

    • MD5

      30f7b5e4c1efd518db750409c81687f5

    • SHA1

      2f4cc4dca76ab19fa056f453be01fc839dfd56e4

    • SHA256

      78faedfacf262aa77dd451a676ea3258c6aea7bcce7d8a2df33bbd9c3329c40e

    • SHA512

      a788e44c39f22a3243cace64444b3641e282e6f97d639ab15fa8e7fc56745f581d1cc9b227c86b47096a85c86691620dd060c542626f556f378c7272a03ca447

    • SSDEEP

      3072:4OpMYTwqYl1xLDHNl/CIqNIPC0QFzTsS00ryNivCcIPF0QFzTsS00ryfi:tTwXl1xDHNlqIqNIPC0QFzTsS00ryjcJ

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks