General

  • Target

    BootstrapperV1.11.exe

  • Size

    229KB

  • Sample

    240803-m6nh1awcpa

  • MD5

    224b37147484176752b12af33b9efd96

  • SHA1

    d2fbb87ff49e0e80e8585b449fac349688d02f23

  • SHA256

    2133a2c5f4a04d8ffe1ea436d035917ad16c50fa011b021c95c71f2660e67033

  • SHA512

    e374e69dad1b3ad39887163e6c8cd07a88e36b167b91b0eeb8a5296f7345ea4c97e6e8e009193b321524f5326118900933e4657b0177b702036525d42c508704

  • SSDEEP

    6144:9loZM+rIkd8g+EtXHkv/iD4lePZsyVtG/TOMdRYz7b8e1m4i:foZtL+EP8lePZsyVtG/TOMdRYDu

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1267765278348152842/-kPKB4JdOggRN8137Je53csdEwdD1XV1iw7mGKhIQuAM7kIz_LwCjyjE2Ekxy7ebgeJr

Targets

    • Target

      BootstrapperV1.11.exe

    • Size

      229KB

    • MD5

      224b37147484176752b12af33b9efd96

    • SHA1

      d2fbb87ff49e0e80e8585b449fac349688d02f23

    • SHA256

      2133a2c5f4a04d8ffe1ea436d035917ad16c50fa011b021c95c71f2660e67033

    • SHA512

      e374e69dad1b3ad39887163e6c8cd07a88e36b167b91b0eeb8a5296f7345ea4c97e6e8e009193b321524f5326118900933e4657b0177b702036525d42c508704

    • SSDEEP

      6144:9loZM+rIkd8g+EtXHkv/iD4lePZsyVtG/TOMdRYz7b8e1m4i:foZtL+EP8lePZsyVtG/TOMdRYDu

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.