General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    240623-k9vqdaxcka

  • MD5

    ffa20ab6d589e2605c984114e8a74fb5

  • SHA1

    c4738ace703f63bb92aa228e1c30429a5a95239c

  • SHA256

    7a8e464571d3e3cee53f601b46d96a2602158e30ee7a1d8e1eebb148fece0d39

  • SHA512

    38d87fb70e31309122cc568677d2c67ff06d31e774f33217e33a3c117bf96709f37ea479501072132fb55911ccd30a02bae3423135aaffd5d8cc673d20f68497

  • SSDEEP

    6144:FloZM3fsXtioRkts/cnnK6cMl4F/Gv8il92eDe8NhoMfb8e1m+i:HoZ1tlRk83Ml4dGv8il92eDe8Nhous

Malware Config

Extracted

Family

umbral

C2

https://ptb.discord.com/api/webhooks/1254364048615800832/LFd9nvq4veWgoUr9qJVwW8J_2qmrASlKxmdI3KCWzLtOX3IcIcHkI3t6_82CEiC-Eefz

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      ffa20ab6d589e2605c984114e8a74fb5

    • SHA1

      c4738ace703f63bb92aa228e1c30429a5a95239c

    • SHA256

      7a8e464571d3e3cee53f601b46d96a2602158e30ee7a1d8e1eebb148fece0d39

    • SHA512

      38d87fb70e31309122cc568677d2c67ff06d31e774f33217e33a3c117bf96709f37ea479501072132fb55911ccd30a02bae3423135aaffd5d8cc673d20f68497

    • SSDEEP

      6144:FloZM3fsXtioRkts/cnnK6cMl4F/Gv8il92eDe8NhoMfb8e1m+i:HoZ1tlRk83Ml4dGv8il92eDe8Nhous

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks