General
-
Target
Umbral.exe
-
Size
496KB
-
Sample
240805-th18hsvfja
-
MD5
2989b8a064354c5fa729d713b84df30e
-
SHA1
a8f8065b500258e7b768c59f9c6f57932d4bcfa1
-
SHA256
bbdd54660f7cfee0d7ec0d5afa51900142c029ae48e71f8d4f834cac00b1761b
-
SHA512
0d5b22d39dff8030755bb120c598aec238549100fb53c40468be7f6adb036867bf464fc9c71b204824f7042faa18cbb90ab199ce450844371b42b79c22fb3e94
-
SSDEEP
12288:VoZtL+EP8jNMGxfEY3tmfh8ItWCw8ZOG:jI85MGxfEY3tmfh8ItDwaO
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1270049148514730095/IR8wg5u43Pwp7dfJhyHN21ljXCCkzpAQry61VjfvTdxGZeHSvggWRaWZnQiWN4vEx0gz
Targets
-
-
Target
Umbral.exe
-
Size
496KB
-
MD5
2989b8a064354c5fa729d713b84df30e
-
SHA1
a8f8065b500258e7b768c59f9c6f57932d4bcfa1
-
SHA256
bbdd54660f7cfee0d7ec0d5afa51900142c029ae48e71f8d4f834cac00b1761b
-
SHA512
0d5b22d39dff8030755bb120c598aec238549100fb53c40468be7f6adb036867bf464fc9c71b204824f7042faa18cbb90ab199ce450844371b42b79c22fb3e94
-
SSDEEP
12288:VoZtL+EP8jNMGxfEY3tmfh8ItWCw8ZOG:jI85MGxfEY3tmfh8ItDwaO
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1