General

  • Target

    Supercell Checker V2.rar

  • Size

    2.5MB

  • Sample

    240623-t2s19a1bll

  • MD5

    6a85c4174345ae7048e0e23cfd9312fe

  • SHA1

    18d1be693c0574700ffdbb320ceea2193eb4ef08

  • SHA256

    f93b6b58f0e4a5e9188342452b12a3d06bcb06afb66330f1612b976590442206

  • SHA512

    842004cd0030099ad69e8ac135be19b5cbda7c78250a5381031322b6e5a943e9f955abbdc78a0b820f25b9962900e0e68daa4c49174b55ed8594f48a6de6f7f7

  • SSDEEP

    49152:CLefTZJlvn+7NQGtVFpBXyEd8BDlXwpDGQcKI652sC3mTX7eOp36A:EefdG7NQGR18xj652sCM1

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1254174290409160735/Qr-uInyE4mruCT3mG0YG1t46p_P8iCEfuzjPnBG_oUejRkL1fbzb_eGU4XrFW4GnRBaA

Targets

    • Target

      Supercell Checker V2.rar

    • Size

      2.5MB

    • MD5

      6a85c4174345ae7048e0e23cfd9312fe

    • SHA1

      18d1be693c0574700ffdbb320ceea2193eb4ef08

    • SHA256

      f93b6b58f0e4a5e9188342452b12a3d06bcb06afb66330f1612b976590442206

    • SHA512

      842004cd0030099ad69e8ac135be19b5cbda7c78250a5381031322b6e5a943e9f955abbdc78a0b820f25b9962900e0e68daa4c49174b55ed8594f48a6de6f7f7

    • SSDEEP

      49152:CLefTZJlvn+7NQGtVFpBXyEd8BDlXwpDGQcKI652sC3mTX7eOp36A:EefdG7NQGR18xj652sCM1

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks