General

  • Target

    Bootstrapper.exe

  • Size

    494KB

  • Sample

    240731-sg6aeazbmq

  • MD5

    b80c04df4f7fd690ce34cf65b30ab204

  • SHA1

    c9348af979d56319086f1448d0681def08da6430

  • SHA256

    3a1b731d964fa9378d37657812ded01ae6a97b15eb114063555045334eee4c26

  • SHA512

    04d0f4399141e44a9ba9579e7d161678f5f9ce8f9b9011ed95e5b239256765ea8fbc989bafb75bc428e330e815359633c8b7438cca603b9849da2cc27eb82fc7

  • SSDEEP

    12288:VoZ0L+EP8N6zJW0b3cQNImHHmr0HcPTywWQ+Ples:QI8MzJW0b3cQNImHHmr0iOwWL

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1254852484468314153/io2pZkFO55QEWZQlG3WzyX7OHzDo9oR7EJm-7aZgKDExigDmYNEwVG2mFVpZn-t7qaDc

Targets

    • Target

      Bootstrapper.exe

    • Size

      494KB

    • MD5

      b80c04df4f7fd690ce34cf65b30ab204

    • SHA1

      c9348af979d56319086f1448d0681def08da6430

    • SHA256

      3a1b731d964fa9378d37657812ded01ae6a97b15eb114063555045334eee4c26

    • SHA512

      04d0f4399141e44a9ba9579e7d161678f5f9ce8f9b9011ed95e5b239256765ea8fbc989bafb75bc428e330e815359633c8b7438cca603b9849da2cc27eb82fc7

    • SSDEEP

      12288:VoZ0L+EP8N6zJW0b3cQNImHHmr0HcPTywWQ+Ples:QI8MzJW0b3cQNImHHmr0iOwWL

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks