General

  • Target

    mm2duper.exe

  • Size

    229KB

  • Sample

    240629-a3lh1swgpc

  • MD5

    65536dc4bcafc3ee3c1dcf7ed64c12df

  • SHA1

    e1ca248ae2ef47a6b89ad6fb155f4d5ec3674e9c

  • SHA256

    98e7e144b7bc45bd52601d093b1e447cf486bf2e8cd2ba84e8325e2d7b269662

  • SHA512

    25f5043750e42d312b879dcb1b37bc4621790f7402befa21578818c8de6020f1983a984bde79eeaca60b3cd12654fe2dae6e728826e0c4da3794be3519d3bcc2

  • SSDEEP

    6144:OwloZM3fsXtioRkts/cnnK6cMlkCanywvrY8hkijD6yBeb8e1mvpi:PoZ1tlRk83MlkCanywvrY8hkijD6yQiw

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1118394761666109480/thDS3oSfSmHsoCQyjlB8zJN33LvfFYhiuSCKRCOwKm_YjjVfoa3nZJjZm8giA5yj1M22

Targets

    • Target

      mm2duper.exe

    • Size

      229KB

    • MD5

      65536dc4bcafc3ee3c1dcf7ed64c12df

    • SHA1

      e1ca248ae2ef47a6b89ad6fb155f4d5ec3674e9c

    • SHA256

      98e7e144b7bc45bd52601d093b1e447cf486bf2e8cd2ba84e8325e2d7b269662

    • SHA512

      25f5043750e42d312b879dcb1b37bc4621790f7402befa21578818c8de6020f1983a984bde79eeaca60b3cd12654fe2dae6e728826e0c4da3794be3519d3bcc2

    • SSDEEP

      6144:OwloZM3fsXtioRkts/cnnK6cMlkCanywvrY8hkijD6yBeb8e1mvpi:PoZ1tlRk83MlkCanywvrY8hkijD6yQiw

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks