General

  • Target

    ogasda.exe

  • Size

    229KB

  • Sample

    240804-n4zc6avbnk

  • MD5

    33a10c04946e6aebc438b7cba8b42140

  • SHA1

    f4b94c6914cabde06072676547af27d1864373e6

  • SHA256

    f2ee9f8cda21c09cf9351463d0cc4dbe1d11ae8dadd8ebfc160ac436d186265e

  • SHA512

    39d288585b07eb81d82ba4f7b475782223b141804e2d1d5c2dae3077f6b7cb2f7778b36e1aa77388ac60fd9a6998b70fe5e99ff302dc23f5ca10c8c373212f1a

  • SSDEEP

    6144:lloZMCrIkd8g+EtXHkv/iD4ZeBZAmB5Kh/Cwhl0YSb8e1m6oOUi:noZZL+EP8ZeBZAmB5Kh/Cwhl0H9

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1269231535564001326/-DNI1DVGwiK_7lLyYmcI6Sv3019WqD3npLPhCO2Tq59p_TFJXb7iYY74NuLR9AOskph3

Targets

    • Target

      ogasda.exe

    • Size

      229KB

    • MD5

      33a10c04946e6aebc438b7cba8b42140

    • SHA1

      f4b94c6914cabde06072676547af27d1864373e6

    • SHA256

      f2ee9f8cda21c09cf9351463d0cc4dbe1d11ae8dadd8ebfc160ac436d186265e

    • SHA512

      39d288585b07eb81d82ba4f7b475782223b141804e2d1d5c2dae3077f6b7cb2f7778b36e1aa77388ac60fd9a6998b70fe5e99ff302dc23f5ca10c8c373212f1a

    • SSDEEP

      6144:lloZMCrIkd8g+EtXHkv/iD4ZeBZAmB5Kh/Cwhl0YSb8e1m6oOUi:noZZL+EP8ZeBZAmB5Kh/Cwhl0H9

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks