General

  • Target

    WaveInstaller.exe

  • Size

    229KB

  • Sample

    240703-xa2e4asejn

  • MD5

    7ca49c1e4deac51030961240dc071e44

  • SHA1

    dbe976f4e1ca8476cf35105e214e98c071bdb601

  • SHA256

    c4969a3f443dc0c21066c9b801a86d8802585ed708f209cd418d0252541884bd

  • SHA512

    cb70825c4cebc592cfe281214f3a614a5a0eac78dac3cc0a5da7116b9d2eb5af718745067c0c7be3b2957c3ddade18416171863490d40c0bec8162e0322303ae

  • SSDEEP

    6144:FloZMZrIkd8g+EtXHkv/iD4SpQvDJ6id1IJbGmTuOb8e1mBi:HoZ6L+EP8SpQvDJ6id1IJbGmT5D

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1257990750105239572/oxObyEqK8LZqJLF9958xM8O0ELZTwn2jyxVKBszQf6OpxSVsjZjE1JOm2PnReGiCbZkI

Targets

    • Target

      WaveInstaller.exe

    • Size

      229KB

    • MD5

      7ca49c1e4deac51030961240dc071e44

    • SHA1

      dbe976f4e1ca8476cf35105e214e98c071bdb601

    • SHA256

      c4969a3f443dc0c21066c9b801a86d8802585ed708f209cd418d0252541884bd

    • SHA512

      cb70825c4cebc592cfe281214f3a614a5a0eac78dac3cc0a5da7116b9d2eb5af718745067c0c7be3b2957c3ddade18416171863490d40c0bec8162e0322303ae

    • SSDEEP

      6144:FloZMZrIkd8g+EtXHkv/iD4SpQvDJ6id1IJbGmTuOb8e1mBi:HoZ6L+EP8SpQvDJ6id1IJbGmT5D

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks