General

  • Target

    049c49c23b12b4c23c7dd37a7d1c4b10_NeikiAnalytics.exe

  • Size

    221KB

  • Sample

    240518-z65thagf68

  • MD5

    049c49c23b12b4c23c7dd37a7d1c4b10

  • SHA1

    7f6ca35b4fcf42dc73fd9ca4528f5aed2e5e7557

  • SHA256

    eb7b040543cc8d89d74c37e1d8dda3f909afe93f4ba9669e9442713e9ff2485c

  • SHA512

    787f50e65b3ef337ad1737cb091b85a074bbdd1e675528135660cb31cae9e46a097faf2c60bf0b8ca27520c901b7913e25230faf389aee655199661343b1326b

  • SSDEEP

    6144:hloZMrrIkd8g+EtXHkv/iD4leM7K8euoLi:ToZcL+EP8cTG

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1228801675192434699/4V83fxMqnhQaBVBOkpyxB0hZM1YFxQVOG2NldDqxXZPGIT2p_LzBh2rGUpNaosvH3Mic

Targets

    • Target

      049c49c23b12b4c23c7dd37a7d1c4b10_NeikiAnalytics.exe

    • Size

      221KB

    • MD5

      049c49c23b12b4c23c7dd37a7d1c4b10

    • SHA1

      7f6ca35b4fcf42dc73fd9ca4528f5aed2e5e7557

    • SHA256

      eb7b040543cc8d89d74c37e1d8dda3f909afe93f4ba9669e9442713e9ff2485c

    • SHA512

      787f50e65b3ef337ad1737cb091b85a074bbdd1e675528135660cb31cae9e46a097faf2c60bf0b8ca27520c901b7913e25230faf389aee655199661343b1326b

    • SSDEEP

      6144:hloZMrrIkd8g+EtXHkv/iD4leM7K8euoLi:ToZcL+EP8cTG

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks