General

  • Target

    CS2RED_Checker.zip

  • Size

    18.1MB

  • Sample

    240703-rq8lfssfjb

  • MD5

    5845377259e765b722b1a20c48b5bc7d

  • SHA1

    aea4c56e80f7b7e229bfc15ba7cdc15f604d6e46

  • SHA256

    e1eedf9077fe9a2532130dc80fcd13878835490f5eae82295805b7eb67691a82

  • SHA512

    8f42eefe99bfa073f3ebb23ba3ce4138e1a9dec94e556a86a0ab26bfe7dd2dc5fe4511e5a80565cec8e70d221676d640b0b7d161d8646af373a1a2f043a1fac0

  • SSDEEP

    393216:89j/EL3W7bU5wSD5vIxbklXGWI6r6nrrPivuaJlSSPQvPuja94MwNYz:89UWM57D6xgWz6r8/yu0dhUeYz

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1257834381473747065/A4PdBtqpeMQGdn1UQ02Bvb8Scj6VK16zOyUctn2SFAznIBMMfKXT9QsfPt39umhw0A8L

Targets

    • Target

      CS2RED' Programs/CS2REDСhecker.exe

    • Size

      229KB

    • MD5

      8171222317c30d31448205d70bca990f

    • SHA1

      574d07820d3cb49c60a29defe88675072b9ae977

    • SHA256

      d7a96d169d8c99e83b7a4eb920b8934cedeaa0ce1619d0cc677a83e0556ca2c2

    • SHA512

      3a7f30a04f843294775b2501b9f51e4f2d2af4a834fa573791dcb2556526f4b834ac019bebab3fb9f062dd3012328cc2ea75db87df32d9b23346e2c495267e80

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD45S4Uhv0IH+2PxM4d5Zb8e1m4i:noZtL+EP85S4Uhv0IH+2PxM4dLq

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks