General

  • Target

    betaloader.exe

  • Size

    482KB

  • Sample

    240706-a4pbastand

  • MD5

    f0463e89e4d196f296afb160224f63b0

  • SHA1

    1ada6bf36121d08f96f4a09402774d3d5a065a7d

  • SHA256

    d891136336eb391236b2cc2f6749440d9eb4dc8fc517eb1262cf739276657073

  • SHA512

    8aacfd6f7c745d41bc639d90cb841652541ec17f7f745bd3ee9f2d24458b3b0c1a5d6b9d50a1e9a50a3e583841e4a443f8d930e626365bc729bff93d19528e34

  • SSDEEP

    12288:6oZtL+EP8DWQVjgULgyD1Ac5H2xSY2RpX2ZrAyhteZN:+I86QVjgULgyD1Ac5HJBpX2Z3ts

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1254794965268299827/EE6SKfQhdH1VUguOzHvaA_cNjKMrNA7OYXHOMkNwJT_pYjMBf-9VvYMNTexyuwjEK14O

Targets

    • Target

      betaloader.exe

    • Size

      482KB

    • MD5

      f0463e89e4d196f296afb160224f63b0

    • SHA1

      1ada6bf36121d08f96f4a09402774d3d5a065a7d

    • SHA256

      d891136336eb391236b2cc2f6749440d9eb4dc8fc517eb1262cf739276657073

    • SHA512

      8aacfd6f7c745d41bc639d90cb841652541ec17f7f745bd3ee9f2d24458b3b0c1a5d6b9d50a1e9a50a3e583841e4a443f8d930e626365bc729bff93d19528e34

    • SSDEEP

      12288:6oZtL+EP8DWQVjgULgyD1Ac5H2xSY2RpX2ZrAyhteZN:+I86QVjgULgyD1Ac5HJBpX2Z3ts

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks