General

  • Target

    External discord.gg61.exe

  • Size

    229KB

  • Sample

    240510-wk3v8sdb52

  • MD5

    1b3fa21117b5da00f973089c28f2039e

  • SHA1

    7c57451a38edab8b758e6343415aad2037ea6603

  • SHA256

    b578fa1cba248ad18bd23bf52c3ac0727fca85c7415bb26ca6d7093e04a8045b

  • SHA512

    b1fc5e584b2f67d52f0378b2870df950220e20d68d5ef33208eed76ece08f7984497f0499d2ba801d288b04d22ebd5877e681fde08fe019c290089f0b903c9cd

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4yLYussyVtGITOMdRYC+b8e1mDMi:noZtL+EP8yL/ssyVtGITOMdRYtCF

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1237446172554297375/cxTKcx8dwZQW37CjJD7okYeib5aGse1r1E4yOCQ5wfC2nVcrxv95R7DUMyLVPLMxN-jz

Targets

    • Target

      External discord.gg61.exe

    • Size

      229KB

    • MD5

      1b3fa21117b5da00f973089c28f2039e

    • SHA1

      7c57451a38edab8b758e6343415aad2037ea6603

    • SHA256

      b578fa1cba248ad18bd23bf52c3ac0727fca85c7415bb26ca6d7093e04a8045b

    • SHA512

      b1fc5e584b2f67d52f0378b2870df950220e20d68d5ef33208eed76ece08f7984497f0499d2ba801d288b04d22ebd5877e681fde08fe019c290089f0b903c9cd

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4yLYussyVtGITOMdRYC+b8e1mDMi:noZtL+EP8yL/ssyVtGITOMdRYtCF

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks