General

  • Target

    PlagueByKitty.exe

  • Size

    494KB

  • Sample

    240619-m19jaatcln

  • MD5

    3fc34ffadd0750eab33911bc15c17c64

  • SHA1

    ae8f5f769bc88728573e1505cb9fded184cde758

  • SHA256

    cdf0afcac0224a29fd1f7f02157a28f2ece5581a49fede543b337907af1d9288

  • SHA512

    eb196328793fe450ded192c3ea4b57bc6b74a4fd1fff67b3fdc234a9c4efdc1c41d7e678ec3969dc2277d808e5a30505bf3888e1af4ae3caff5877850c1c6f89

  • SSDEEP

    6144:PloZM+rIkd8g+EtXHkv/iD4qPxkU69VeQbGkFZwPF5b8e1m4iebT:toZtL+EP8qPxkU69VeQbGkFZwny

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1252939244289130598/Yg-57hNdAnH4sSAJSqQ-NFZ9RWZCgUPD8PvTftfj7GfuPzHKwGXhfWsyJ8Vf9Cp8-gSr

Targets

    • Target

      PlagueByKitty.exe

    • Size

      494KB

    • MD5

      3fc34ffadd0750eab33911bc15c17c64

    • SHA1

      ae8f5f769bc88728573e1505cb9fded184cde758

    • SHA256

      cdf0afcac0224a29fd1f7f02157a28f2ece5581a49fede543b337907af1d9288

    • SHA512

      eb196328793fe450ded192c3ea4b57bc6b74a4fd1fff67b3fdc234a9c4efdc1c41d7e678ec3969dc2277d808e5a30505bf3888e1af4ae3caff5877850c1c6f89

    • SSDEEP

      6144:PloZM+rIkd8g+EtXHkv/iD4qPxkU69VeQbGkFZwPF5b8e1m4iebT:toZtL+EP8qPxkU69VeQbGkFZwny

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks