Resubmissions

26-07-2024 22:22

240726-2ap5aaycqq 10

General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    240726-2ap5aaycqq

  • MD5

    7b8f7224e44d39c521160c3b33e22e98

  • SHA1

    a8ab775e550aef4aa3b2f485116bcc245c7ccb48

  • SHA256

    256aa419764dc6cf6fef1a4bbe7a918c207c48515e9e13d18881a69b326c79f0

  • SHA512

    c11c922edb6d3aa634fd68dc59a86463fd29b27eead95864efc003fcbb226610854f3acceff7b580fb96443952aa68696f87ea4004e01af96eca570a75359859

  • SSDEEP

    6144:tloZM9rIkd8g+EtXHkv/iD4u5PpSQPL42BECDja/yb8e1mUZJi:voZmL+EP8u5PpSQPL42BECDjamp+

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1266518334506012802/Qw1X9GG-GFtHfQQhPAxRerwsZC0qm8UTflcN_59heNa2RZHB4gApWY0zSyOfYqSD-EbU

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      7b8f7224e44d39c521160c3b33e22e98

    • SHA1

      a8ab775e550aef4aa3b2f485116bcc245c7ccb48

    • SHA256

      256aa419764dc6cf6fef1a4bbe7a918c207c48515e9e13d18881a69b326c79f0

    • SHA512

      c11c922edb6d3aa634fd68dc59a86463fd29b27eead95864efc003fcbb226610854f3acceff7b580fb96443952aa68696f87ea4004e01af96eca570a75359859

    • SSDEEP

      6144:tloZM9rIkd8g+EtXHkv/iD4u5PpSQPL42BECDja/yb8e1mUZJi:voZmL+EP8u5PpSQPL42BECDjamp+

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks