General

  • Target

    Umbral.exe

  • Size

    231KB

  • Sample

    240805-snnc6szdkl

  • MD5

    37040bc6e02b555d9062631211678bc9

  • SHA1

    cb2f4548ce9bd51ce42301ffa74130d9c6098ad5

  • SHA256

    3294164d79836fe3765e57e50dd0ac898164ccc049f097fb2deb2725478aa583

  • SHA512

    e5db52931152bef14e1dda82288a1f4265d79c4c4ad08f143994b2b60b2b530dfbcdcb1468bd70e5799a55b2a4f02565249e0d41944032bbd43a296757d9754c

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4FxEe9rI8jB67NokR4cb8e1mtqpui:joZtL+EP8FxEe9rI8jB67NokRxuqR

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1270032462076182559/b8wi9cfMdsx4v72a9Wyf8VdQSJy1Kwdvjyc1PALcINFs2LLbaB5jd030GBMtjUk07Yz9

Targets

    • Target

      Umbral.exe

    • Size

      231KB

    • MD5

      37040bc6e02b555d9062631211678bc9

    • SHA1

      cb2f4548ce9bd51ce42301ffa74130d9c6098ad5

    • SHA256

      3294164d79836fe3765e57e50dd0ac898164ccc049f097fb2deb2725478aa583

    • SHA512

      e5db52931152bef14e1dda82288a1f4265d79c4c4ad08f143994b2b60b2b530dfbcdcb1468bd70e5799a55b2a4f02565249e0d41944032bbd43a296757d9754c

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD4FxEe9rI8jB67NokR4cb8e1mtqpui:joZtL+EP8FxEe9rI8jB67NokRxuqR

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks