General

  • Target

    ProjectExstracter.exe

  • Size

    235KB

  • Sample

    240601-ngdg6sba5z

  • MD5

    32099bdcf2a8c75821bc048193d3b1f5

  • SHA1

    3a28da976bdb4f301dc94afcd0cf2ed60e0c0065

  • SHA256

    25c02277f2a8d87c337a7ed145b3aebe37df66811b7fa9f158dfb09af777fd19

  • SHA512

    e13e0c78cff7e9603c2cee4c720d5680c3ddbd0a21303dcd67733c06f284f7657cdfd10544e6cab470f4d92129a5e8c98684cb518b204ffcfba439249bcaa18c

  • SSDEEP

    6144:TloZM+rIkd8g+EtXHkv/iD4agl0LxCqVYQhTuOLKDb8e1moiLiP:RoZtL+EP8agl0LxCqVYQhTuOLM3J

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1208265063908122664/VHOK-IsM3adoYg6Y_EeS7C676q9Dr8KIhATvohfzxAGtSTTjD6rNR_3PZ0lPq3hmTbNo

Targets

    • Target

      ProjectExstracter.exe

    • Size

      235KB

    • MD5

      32099bdcf2a8c75821bc048193d3b1f5

    • SHA1

      3a28da976bdb4f301dc94afcd0cf2ed60e0c0065

    • SHA256

      25c02277f2a8d87c337a7ed145b3aebe37df66811b7fa9f158dfb09af777fd19

    • SHA512

      e13e0c78cff7e9603c2cee4c720d5680c3ddbd0a21303dcd67733c06f284f7657cdfd10544e6cab470f4d92129a5e8c98684cb518b204ffcfba439249bcaa18c

    • SSDEEP

      6144:TloZM+rIkd8g+EtXHkv/iD4agl0LxCqVYQhTuOLKDb8e1moiLiP:RoZtL+EP8agl0LxCqVYQhTuOLM3J

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks