General

  • Target

    MinecraftCheat.exe

  • Size

    231KB

  • Sample

    240605-mx6m8ade3t

  • MD5

    20384d9a8661d8d1c6baeba964939ba0

  • SHA1

    e44f61df3bc54d183d673235b29cf1669c978dcc

  • SHA256

    8615172da6f2114f1a7b0b41050f6a3556b725d5f8aec82cc4558504137e4299

  • SHA512

    4384c8c5b05ca17191c5c3636808adc84ede226dd56c15fed4127aea830d141f920079a3e3fef6bca688911ca0185336cdf327bbbed57f8f311162a83032e578

  • SSDEEP

    6144:RloZM9rIkd8g+EtXHkv/iD4fNPjpaC9Hop7mGzY8vI8e1m1Ji:joZOL+EP8fNPjpaC9Hop7mGzgqQ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1247863670193786953/uhEecI9mXTqtTxrrZ3szFIc6tljBLxaaV_u2nDSM-ifuzaikK5Rp-LUeoymh7HdiyCVU

Targets

    • Target

      MinecraftCheat.exe

    • Size

      231KB

    • MD5

      20384d9a8661d8d1c6baeba964939ba0

    • SHA1

      e44f61df3bc54d183d673235b29cf1669c978dcc

    • SHA256

      8615172da6f2114f1a7b0b41050f6a3556b725d5f8aec82cc4558504137e4299

    • SHA512

      4384c8c5b05ca17191c5c3636808adc84ede226dd56c15fed4127aea830d141f920079a3e3fef6bca688911ca0185336cdf327bbbed57f8f311162a83032e578

    • SSDEEP

      6144:RloZM9rIkd8g+EtXHkv/iD4fNPjpaC9Hop7mGzY8vI8e1m1Ji:joZOL+EP8fNPjpaC9Hop7mGzgqQ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks