General

  • Target

    Start.bat

  • Size

    229KB

  • Sample

    240629-ptmgaa1ajr

  • MD5

    ad7985437149caea11bef60b8a5ef81a

  • SHA1

    e098454f7c03a1ed404ee323d686c35839ac4def

  • SHA256

    791d000badab89e84dac09066f475c877ad8ea07c5da080cc1ffbff77b3e886b

  • SHA512

    22867a2fb56af5720b18ca01e1195eefee4cd0ced017e40a929b2587889392fbe99e68729aaefee736817afcf69ca49c411ed93b7edee736c12f32ee933f70e9

  • SSDEEP

    6144:tloZM+rIkd8g+EtXHkv/iD48fQtxox8e1mNwi:voZtL+EP8Ugx6s

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1252958225951756439/l_C-SRxxSfL_3KvfSQAu2ZXgeFRiErI68o9oT7QU3XBWK9_ubD0F7PTBxs60Loj_S7td

Targets

    • Target

      Start.bat

    • Size

      229KB

    • MD5

      ad7985437149caea11bef60b8a5ef81a

    • SHA1

      e098454f7c03a1ed404ee323d686c35839ac4def

    • SHA256

      791d000badab89e84dac09066f475c877ad8ea07c5da080cc1ffbff77b3e886b

    • SHA512

      22867a2fb56af5720b18ca01e1195eefee4cd0ced017e40a929b2587889392fbe99e68729aaefee736817afcf69ca49c411ed93b7edee736c12f32ee933f70e9

    • SSDEEP

      6144:tloZM+rIkd8g+EtXHkv/iD48fQtxox8e1mNwi:voZtL+EP8Ugx6s

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks