General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    240718-z1vrcawgmj

  • MD5

    47a00d21a6b9b87b9ff9d9190d820531

  • SHA1

    f70756addfdffe4333ea2811233c15c3923a3a2f

  • SHA256

    3fc208899b7c2f6208b31ead1b538808dac5fbcc79de62ca867ee0f27064e6ac

  • SHA512

    b9cbcf10cd9024449524a3554f37cf73bbdf9c983a7c2cfe605eb581902eb9c7e450277e9d627607c2ad369fd415ec141109559a3371198d5ee0a37d2d21a2cc

  • SSDEEP

    6144:lloZMLrIkd8g+EtXHkv/iD4lAMc1aYe5xyRXKYZd8l0b8e1maqvRei:noZ0L+EP8WMc1aYe5xyRXKYZd8WJqvRT

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1260936672724385829/8zvimZzQuHtU4AEMjra0gNXPNmEl8F0OXX5Y66cA5fxhOuePu2AFpfI5VOJ7uiyNYne5

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      47a00d21a6b9b87b9ff9d9190d820531

    • SHA1

      f70756addfdffe4333ea2811233c15c3923a3a2f

    • SHA256

      3fc208899b7c2f6208b31ead1b538808dac5fbcc79de62ca867ee0f27064e6ac

    • SHA512

      b9cbcf10cd9024449524a3554f37cf73bbdf9c983a7c2cfe605eb581902eb9c7e450277e9d627607c2ad369fd415ec141109559a3371198d5ee0a37d2d21a2cc

    • SSDEEP

      6144:lloZMLrIkd8g+EtXHkv/iD4lAMc1aYe5xyRXKYZd8l0b8e1maqvRei:noZ0L+EP8WMc1aYe5xyRXKYZd8WJqvRT

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks