General

  • Target

    f867a240eab1d2993a2a0917e1ba63d9156e66ad637d0a500afc0347c5172075

  • Size

    232KB

  • Sample

    240710-jb58savamp

  • MD5

    d534b7ce43629032d053b5c88122e761

  • SHA1

    161b697296b3225d2e0116729e3f493660a48196

  • SHA256

    f867a240eab1d2993a2a0917e1ba63d9156e66ad637d0a500afc0347c5172075

  • SHA512

    ffbbe9f7f4890c4f9b17142a81a5b724a15373a6fab89bf46a2e28068c89b96cec0cebaf4248ff10b21c826f003c6090aeea7fc80f42137961f3efb7cd708f15

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD4OnhUsyVtGdTOMdRYQMWb8e1mLeqi:DoZtL+EP8OnhUsyVtGdTOMdRYQHdP

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1255170369241874474/nLCkKrU2TZdzc2UskGyF2__QGRfs9GisPj5UhmiVTh71Fb7bgGEPnaS1YMyVE7N38Xic

Targets

    • Target

      f867a240eab1d2993a2a0917e1ba63d9156e66ad637d0a500afc0347c5172075

    • Size

      232KB

    • MD5

      d534b7ce43629032d053b5c88122e761

    • SHA1

      161b697296b3225d2e0116729e3f493660a48196

    • SHA256

      f867a240eab1d2993a2a0917e1ba63d9156e66ad637d0a500afc0347c5172075

    • SHA512

      ffbbe9f7f4890c4f9b17142a81a5b724a15373a6fab89bf46a2e28068c89b96cec0cebaf4248ff10b21c826f003c6090aeea7fc80f42137961f3efb7cd708f15

    • SSDEEP

      6144:xloZM+rIkd8g+EtXHkv/iD4OnhUsyVtGdTOMdRYQMWb8e1mLeqi:DoZtL+EP8OnhUsyVtGdTOMdRYQHdP

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks