General

  • Target

    y.exe

  • Size

    239.6MB

  • Sample

    240731-rxgfjssgma

  • MD5

    7bc24e7086602e2c40d2754c02135c48

  • SHA1

    18977a14ad6b20c1144dbbfa12e78cc90e1a442e

  • SHA256

    7e1551da31d28dace7603760dc443484bda40fe6df16b837b9b847a17b6e12b1

  • SHA512

    7dbe20126e325b9c54b36fea469a4873d7a237ce651676d97ec853b3c9b715a015411c754c1d33ba3730ccd601d1ab7c2adebabc21e31df17f564a2cb36ab94e

  • SSDEEP

    6291456:LWNNVyRIyTqynr7d5Gmkuk3Yk6HURJXK:uNoNnr7d5KSEK

Malware Config

Targets

    • Target

      y.exe

    • Size

      239.6MB

    • MD5

      7bc24e7086602e2c40d2754c02135c48

    • SHA1

      18977a14ad6b20c1144dbbfa12e78cc90e1a442e

    • SHA256

      7e1551da31d28dace7603760dc443484bda40fe6df16b837b9b847a17b6e12b1

    • SHA512

      7dbe20126e325b9c54b36fea469a4873d7a237ce651676d97ec853b3c9b715a015411c754c1d33ba3730ccd601d1ab7c2adebabc21e31df17f564a2cb36ab94e

    • SSDEEP

      6291456:LWNNVyRIyTqynr7d5Gmkuk3Yk6HURJXK:uNoNnr7d5KSEK

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks