General

  • Target

    17508839c779fe50ce47b2c4876ec4f0N.exe

  • Size

    231KB

  • Sample

    240806-14e1qssdjm

  • MD5

    17508839c779fe50ce47b2c4876ec4f0

  • SHA1

    bfa4951e0b2dda63a26b8991ae46642ff97afb8c

  • SHA256

    5b3d67d18e808838c40d63fb02c1f696efad628fdf3d36fab4e03b4127a8bdd9

  • SHA512

    577b3404da3c849e2f264e053a8ac8f259fb6d285da3cd7d7b71045bc2d7460255a670d7be3cf5ba9671b257ca43fc2c681949d0ede070f916b43c6a604999a7

  • SSDEEP

    6144:xloZMHrIkd8g+EtXHkv/iD4Sl/t/1+mp1sl3ySXxcb8e1mii:DoZIL+EP8Sl/t/1+mp1sl3ySX+g

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1267114467074768926/OmbOGsGy17yPZDMOxlAykdgIRsAw0myEj9ql2feukV7XxdogqQI2iZVMospo55gRatx_

Targets

    • Target

      17508839c779fe50ce47b2c4876ec4f0N.exe

    • Size

      231KB

    • MD5

      17508839c779fe50ce47b2c4876ec4f0

    • SHA1

      bfa4951e0b2dda63a26b8991ae46642ff97afb8c

    • SHA256

      5b3d67d18e808838c40d63fb02c1f696efad628fdf3d36fab4e03b4127a8bdd9

    • SHA512

      577b3404da3c849e2f264e053a8ac8f259fb6d285da3cd7d7b71045bc2d7460255a670d7be3cf5ba9671b257ca43fc2c681949d0ede070f916b43c6a604999a7

    • SSDEEP

      6144:xloZMHrIkd8g+EtXHkv/iD4Sl/t/1+mp1sl3ySXxcb8e1mii:DoZIL+EP8Sl/t/1+mp1sl3ySX+g

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks