General

  • Target

    VapeV4.exe

  • Size

    12.0MB

  • Sample

    240731-qhwq9azbmg

  • MD5

    5f3fabec375e5a1acc1431477309ab48

  • SHA1

    c12fc1f9da09dd799601cc8c852cd742e6d2b32e

  • SHA256

    14a16b4fcb0af8c5fae891e060a5175f58c020a735be9e5a2242ac76c4327946

  • SHA512

    9b9567c649e98964949dc00a6865d0656c2fa600f294a654ef4264b48a6b34f0d3096c20603acafbb47c4e1568893078dc53c5a619a9b839fee434853bfb9d72

  • SSDEEP

    98304:DemvHzXnfpOfKEmZH0H7UpjSSJgEEjZoTsBbZAqSsraMh+QIUuoMOWucEZ8:DNHrxygH87BdjZ/JPraxzNo

Malware Config

Targets

    • Target

      VapeV4.exe

    • Size

      12.0MB

    • MD5

      5f3fabec375e5a1acc1431477309ab48

    • SHA1

      c12fc1f9da09dd799601cc8c852cd742e6d2b32e

    • SHA256

      14a16b4fcb0af8c5fae891e060a5175f58c020a735be9e5a2242ac76c4327946

    • SHA512

      9b9567c649e98964949dc00a6865d0656c2fa600f294a654ef4264b48a6b34f0d3096c20603acafbb47c4e1568893078dc53c5a619a9b839fee434853bfb9d72

    • SSDEEP

      98304:DemvHzXnfpOfKEmZH0H7UpjSSJgEEjZoTsBbZAqSsraMh+QIUuoMOWucEZ8:DNHrxygH87BdjZ/JPraxzNo

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks