General

  • Target

    FunChecker.vmp.exe

  • Size

    13.6MB

  • Sample

    240719-1j13gavdjd

  • MD5

    8b2fa6497ba4fc285a5545bda2e8cde6

  • SHA1

    31cec6fb97888c34c80af8ca73aa67456f68e4e3

  • SHA256

    5197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c

  • SHA512

    fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40

  • SSDEEP

    393216:jrmibLqxo6IKWmKF8tmZ4O/Qtu1dmoz2jqK8VPYAjV2:jr7b+xHI76tmZ4O4E1d99QAjQ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_

Targets

    • Target

      FunChecker.vmp.exe

    • Size

      13.6MB

    • MD5

      8b2fa6497ba4fc285a5545bda2e8cde6

    • SHA1

      31cec6fb97888c34c80af8ca73aa67456f68e4e3

    • SHA256

      5197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c

    • SHA512

      fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40

    • SSDEEP

      393216:jrmibLqxo6IKWmKF8tmZ4O/Qtu1dmoz2jqK8VPYAjV2:jr7b+xHI76tmZ4O4E1d99QAjQ

    • Detect Umbral payload

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks