General

  • Target

    2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db

  • Size

    106KB

  • Sample

    240622-x258csvfrm

  • MD5

    b06c811554508247282dc00b7a82b0ef

  • SHA1

    1574070e54ae15a93b8a9ecd4a40a98cfb2f1a71

  • SHA256

    2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db

  • SHA512

    f9f1f1c75ac472e4167ecba2811eae3b66c7023bd9257c310e2469be8b796010cb0657244640e2525f46464cee894bef87d284fb02b5ee3439d3f23ab45a8c6e

  • SSDEEP

    3072:GmqRL49gVu4HLM2daP8NJYHttq9iZLSHdUvynNe9nLsZ:GbeIM4/JY7q9SLS9Eynw9nL

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1188379475021410374/Ssj5Ns9zjIl8_hao3wt15snRVqwtBYjDt8QLCtqPC4z6ltGHrqIRWciPemKhTAJ3Ea_2

Targets

    • Target

      2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db

    • Size

      106KB

    • MD5

      b06c811554508247282dc00b7a82b0ef

    • SHA1

      1574070e54ae15a93b8a9ecd4a40a98cfb2f1a71

    • SHA256

      2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db

    • SHA512

      f9f1f1c75ac472e4167ecba2811eae3b66c7023bd9257c310e2469be8b796010cb0657244640e2525f46464cee894bef87d284fb02b5ee3439d3f23ab45a8c6e

    • SSDEEP

      3072:GmqRL49gVu4HLM2daP8NJYHttq9iZLSHdUvynNe9nLsZ:GbeIM4/JY7q9SLS9Eynw9nL

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables attemping to enumerate video devices using WMI

    • Detects executables containing possible sandbox analysis VM names

    • Detects executables containing possible sandbox analysis VM usernames

    • Detects executables containing possible sandbox system UUIDs

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks