General

  • Target

    CsGo 2 Cheat.zip

  • Size

    93KB

  • Sample

    240715-cknxjawaqc

  • MD5

    a9685fd5412dfbf923ad847ea9bd53f0

  • SHA1

    f286fdd97aeb6da2356f6a11dacc2c6a715af555

  • SHA256

    529446272a00573d797941f1e6536647be16499be376133ac65899c97305903e

  • SHA512

    b8da61b7d4d531c6871afda8b80c00e00d69e9a43ec707dc501d63a9420525efb83d5cf90dada350fd5afc2e170130caf9c06d24b225acc0a534425f99845c75

  • SSDEEP

    1536:SCxtAfarbZxlSs7M3crllXTwvznFViXLr10C2zmuI8+xnVorZ7qBKHpLYR2F6ucw:SCESrbZxtDDwvzFVmLryCQmuI9VaH1gS

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1258602776821497898/Y--1ciAdpkakRd4oja4AeZEOO2J2ANndb5_rCtjmBXUuzDIavFbGBPyzIFM6JLG_j4Db

Targets

    • Target

      CsGo 2 Cheat/undetek-v6.9.3.exe

    • Size

      230KB

    • MD5

      516758abff2f243a0cba24669f96c751

    • SHA1

      6a7dd5a986c4b213cb624212137b9132f0c4ef21

    • SHA256

      47c501095d9096a3c2837d2312f3c51b679964e2c40426e5f9a245b7b5b66939

    • SHA512

      7b254602e70075f02b3d19a2a8f669d4a8f5a0c1b5278fd2b4e154b3668d1cfea00da80984395a80da62c232e1b69320725992a14183642a579fb0b98c147162

    • SSDEEP

      6144:TloZM+rIkd8g+EtXHkv/iD4lvuPT5KyNv4ZL22jOjb8e1mYi:RoZtL+EP8lvuPT5KyNv4ZL22jg2

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks