General

  • Target

    Umbral.exe

  • Size

    231KB

  • Sample

    240605-yejaraff4y

  • MD5

    c3aa0f5ac11d11f2a741c0502d4cd3a2

  • SHA1

    96736e1e76a2f59c460a85472a58bc98dc8bd084

  • SHA256

    928ff5c9bb5e02499ed4611c84ff1b2b8bd498f6db9451f8d7f5fa78202d37ef

  • SHA512

    854b49c85e976a101d8e6c1fe2cf14f7cb99f5025d29a2f0636796fec9d745bafe606223de3b79339a7f98b746f005aec72483d984620a99648ec4ea9c649d21

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD4alC0ad1+57mEl5QIf7tLJh8e1mAai:DoZtL+EP8alC0ad1+57mEl5QIRLzLf

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1247998394866339961/eoD_WLQINT3umixNrhhmADOvlQrs7MT_mFTy66H-czWd3woByI6Fvc8Ha5Xz_WZqYf0Q

Targets

    • Target

      Umbral.exe

    • Size

      231KB

    • MD5

      c3aa0f5ac11d11f2a741c0502d4cd3a2

    • SHA1

      96736e1e76a2f59c460a85472a58bc98dc8bd084

    • SHA256

      928ff5c9bb5e02499ed4611c84ff1b2b8bd498f6db9451f8d7f5fa78202d37ef

    • SHA512

      854b49c85e976a101d8e6c1fe2cf14f7cb99f5025d29a2f0636796fec9d745bafe606223de3b79339a7f98b746f005aec72483d984620a99648ec4ea9c649d21

    • SSDEEP

      6144:xloZM+rIkd8g+EtXHkv/iD4alC0ad1+57mEl5QIf7tLJh8e1mAai:DoZtL+EP8alC0ad1+57mEl5QIRLzLf

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks