General

  • Target

    FarmInject.exe

  • Size

    231KB

  • Sample

    240719-l3p2zsyepg

  • MD5

    06266d2df2b7ca91e7b3b7a26b13d3f8

  • SHA1

    bd85f02d1e81eae97d802bb23a24ab70fb054f45

  • SHA256

    1bb943ec9c40c294f145ecaf7701ddb78e3569f6b0b0224117dbcafb970bd34b

  • SHA512

    dc641d76013a3016479e86fa2d5b97280cb507abc1385bd0b63b713b167bd44f8189e6728a5c00001454dfe6ffaf3a818d13c4797ee0861948d9bcbf7528ce4b

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4fl9cw2xpaRPyAxVkkAb8e1mvcnr4vi:joZtL+EP8fl9cw2xpaRPyAxVkZecr46

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1262281731940286584/J9aq7zxJAAFFldypmIl7eyd1g9jLOM5K-apzBybJhhwGHhSAubIJiS351ZVG0RhBcqeD

Targets

    • Target

      FarmInject.exe

    • Size

      231KB

    • MD5

      06266d2df2b7ca91e7b3b7a26b13d3f8

    • SHA1

      bd85f02d1e81eae97d802bb23a24ab70fb054f45

    • SHA256

      1bb943ec9c40c294f145ecaf7701ddb78e3569f6b0b0224117dbcafb970bd34b

    • SHA512

      dc641d76013a3016479e86fa2d5b97280cb507abc1385bd0b63b713b167bd44f8189e6728a5c00001454dfe6ffaf3a818d13c4797ee0861948d9bcbf7528ce4b

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD4fl9cw2xpaRPyAxVkkAb8e1mvcnr4vi:joZtL+EP8fl9cw2xpaRPyAxVkZecr46

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks