General

  • Target

    cb186d77def7fb80cf24a010111b3bfe.jpg

  • Size

    10KB

  • Sample

    240616-vwm4gszgmc

  • MD5

    4459c04d0262372202aabc164d1432d8

  • SHA1

    fb98e4e39b158c2f70301e3af57ff84734f6c28e

  • SHA256

    e3b335a6210e3756c9dad7dfa16d7e2852a9674dd15e8c9b9c4f538cc7ed1014

  • SHA512

    5b55c896fd271ea9449fab422fafd590b4717c7c51f1d21b93b663ec5ecdaa5572faea0e84433549ef951a2e3b2cc5b3580f356b50fb13d0cb009583a1d243b8

  • SSDEEP

    192:IVjpz4P10PcxLIf6ME4c9PfmR3L9z5Lu94Z780qPw2lYgXVhpbuTSDhZgU:I9p1clIfNUfmxl5L7Z780qPwylhpDh6U

Malware Config

Targets

    • Target

      cb186d77def7fb80cf24a010111b3bfe.jpg

    • Size

      10KB

    • MD5

      4459c04d0262372202aabc164d1432d8

    • SHA1

      fb98e4e39b158c2f70301e3af57ff84734f6c28e

    • SHA256

      e3b335a6210e3756c9dad7dfa16d7e2852a9674dd15e8c9b9c4f538cc7ed1014

    • SHA512

      5b55c896fd271ea9449fab422fafd590b4717c7c51f1d21b93b663ec5ecdaa5572faea0e84433549ef951a2e3b2cc5b3580f356b50fb13d0cb009583a1d243b8

    • SSDEEP

      192:IVjpz4P10PcxLIf6ME4c9PfmR3L9z5Lu94Z780qPw2lYgXVhpbuTSDhZgU:I9p1clIfNUfmxl5L7Z780qPwylhpDh6U

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks