General

  • Target

    GeforceChair0.22.exe

  • Size

    231KB

  • Sample

    240730-ebh12aterq

  • MD5

    4889fe4c6bc9c53e9e53983517727fa8

  • SHA1

    3964bac164a7cdc3a0cddd46f8d3aab5e568b515

  • SHA256

    91a8f24b813ec8f33e1222a9996cdfe5c4c0dd56cb922a113a87953878b065a9

  • SHA512

    f44368d7406db49db31b13f578e968a053e100d49cd2dbf05dabe3a4f3e9412e8fd2ce6ac0c363f34091f5e7af78769ca0cc1b6020f7e8e9a313813a575c7100

  • SSDEEP

    6144:BloZM0rIkd8g+EtXHkv/iD4i/QClL8e1m+cOi:zoZDL+EP8IpHE

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1267404483273425028/k8YQeawmuuhmsYpDBs-Q6wJ2H_HeFS9SmCMW95XmRdznY1Eahh4m5w0agoLNs5B1b65I

Targets

    • Target

      GeforceChair0.22.exe

    • Size

      231KB

    • MD5

      4889fe4c6bc9c53e9e53983517727fa8

    • SHA1

      3964bac164a7cdc3a0cddd46f8d3aab5e568b515

    • SHA256

      91a8f24b813ec8f33e1222a9996cdfe5c4c0dd56cb922a113a87953878b065a9

    • SHA512

      f44368d7406db49db31b13f578e968a053e100d49cd2dbf05dabe3a4f3e9412e8fd2ce6ac0c363f34091f5e7af78769ca0cc1b6020f7e8e9a313813a575c7100

    • SSDEEP

      6144:BloZM0rIkd8g+EtXHkv/iD4i/QClL8e1m+cOi:zoZDL+EP8IpHE

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks