General

  • Target

    SolaraB.exe

  • Size

    229KB

  • Sample

    240727-fxfngayhlk

  • MD5

    48baa0394f0e53ec2e19d99a3b98a400

  • SHA1

    723638a8779f3ed8d195fdc1af92bd2036ec1ca6

  • SHA256

    186b386185fc93d31a827f9a711ceb0134e85cd91acf0d8b622b891bda751e79

  • SHA512

    eeab39f6d51059f79d0372cd0b1c2197ac08f53a94068b070a63c28344a92e8d4f521e6b0f0a172e950fcbd17c22a707a7d0cbad3209669b868822651b023c53

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4G//Hdtxd38e1m+Ji:noZtL+EP8ovnxZe

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1261975574994358322/t7Wb9RVyFWem2P4CyLnAxqjaasqdLq2_609gWzc5jJtyvXqVdwYJFdYrwDHN2wbAvuFH

Targets

    • Target

      SolaraB.exe

    • Size

      229KB

    • MD5

      48baa0394f0e53ec2e19d99a3b98a400

    • SHA1

      723638a8779f3ed8d195fdc1af92bd2036ec1ca6

    • SHA256

      186b386185fc93d31a827f9a711ceb0134e85cd91acf0d8b622b891bda751e79

    • SHA512

      eeab39f6d51059f79d0372cd0b1c2197ac08f53a94068b070a63c28344a92e8d4f521e6b0f0a172e950fcbd17c22a707a7d0cbad3209669b868822651b023c53

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4G//Hdtxd38e1m+Ji:noZtL+EP8ovnxZe

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks