General

  • Target

    OptimizedBox-DataSwap2.0.exe

  • Size

    231KB

  • Sample

    240709-yqc8wathna

  • MD5

    cc77383b81a5c1c3e55234691e3dc519

  • SHA1

    2e4af74a0880635706feefde2d6a90a5d77c277c

  • SHA256

    7d620b8c48e10d1d76c421950d2110b7e45972a0037d81168a90658b31e4cf2d

  • SHA512

    573e84b86903e6465f9199c485efa7dcaa04759f0afbfa9f5737ec64123a6ebf2b109a7fa67f1ae63c05fa88cda444f96a11d9dd8e1e5da08b1aa75e056afdd2

  • SSDEEP

    6144:jloZM+rIkd8g+EtXHkv/iD4aphB3tW+xSkt/qqf7mkb8e1mGtAi:BoZtL+EP8aphB3tW+xSkt/qqf3ltZ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1258984887571185774/DYxTJ5Zdg0_fJN7z6ApDnUWn8ae5s21cbiNsLXfJsAHtSlCryNKqmpOy0QPuMuO-tCfe

Targets

    • Target

      OptimizedBox-DataSwap2.0.exe

    • Size

      231KB

    • MD5

      cc77383b81a5c1c3e55234691e3dc519

    • SHA1

      2e4af74a0880635706feefde2d6a90a5d77c277c

    • SHA256

      7d620b8c48e10d1d76c421950d2110b7e45972a0037d81168a90658b31e4cf2d

    • SHA512

      573e84b86903e6465f9199c485efa7dcaa04759f0afbfa9f5737ec64123a6ebf2b109a7fa67f1ae63c05fa88cda444f96a11d9dd8e1e5da08b1aa75e056afdd2

    • SSDEEP

      6144:jloZM+rIkd8g+EtXHkv/iD4aphB3tW+xSkt/qqf7mkb8e1mGtAi:BoZtL+EP8aphB3tW+xSkt/qqf3ltZ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks