General

  • Target

    Exoticgen.exe

  • Size

    235KB

  • Sample

    240801-b1431szakc

  • MD5

    099c16c602df2d705c4f68add9f4dcd7

  • SHA1

    a35dfa3f01bef023bd4170cf1c71099f259bc65d

  • SHA256

    3a01df550a7bbde4061d91acf6641acad0821c5005bb10c37a659493a1f69f6d

  • SHA512

    9055442927d4815a9d584b6881806aa2dded35cc679abf023cc9129efbd499457cc9e184f0f675431134651934984f8fda5a597ee74e6074a44b6887c56f777f

  • SSDEEP

    6144:jloZM+rIkd8g+EtXHkv/iD41+Ic5nsAvvOXZkQlu+Sb8e1m2i:BoZtL+EP81+Ic5nsAvvOXZkQlupw

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1268287678412099709/Dj10I-JT1wc3TzMxCwDZ914TFiP0ZgKRLH8Cvx8O_wI1ZwXgqie8Nq8vyB2QOhtyingd

Targets

    • Target

      Exoticgen.exe

    • Size

      235KB

    • MD5

      099c16c602df2d705c4f68add9f4dcd7

    • SHA1

      a35dfa3f01bef023bd4170cf1c71099f259bc65d

    • SHA256

      3a01df550a7bbde4061d91acf6641acad0821c5005bb10c37a659493a1f69f6d

    • SHA512

      9055442927d4815a9d584b6881806aa2dded35cc679abf023cc9129efbd499457cc9e184f0f675431134651934984f8fda5a597ee74e6074a44b6887c56f777f

    • SSDEEP

      6144:jloZM+rIkd8g+EtXHkv/iD41+Ic5nsAvvOXZkQlu+Sb8e1m2i:BoZtL+EP81+Ic5nsAvvOXZkQlupw

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks