General

  • Target

    0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb.exe

  • Size

    229KB

  • Sample

    240806-be46wsvajm

  • MD5

    ae3713305401315a3b520e84fb786fe5

  • SHA1

    914bd258c204e4cddab9dc0dbfb9c7134659ad57

  • SHA256

    0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb

  • SHA512

    ae29d0c4c9106dcfbd4a212968d7d8b87236c2f39ce37435d3a658fe1b42875e44cc65c98f818391a8051312811b51da747efef5fa347f3a053b58454bd1e155

  • SSDEEP

    6144:dloZM3fsXtioRkts/cnnK6cMlpGZ7lTwk7tiTlwsJtSb8e1mdi:/oZ1tlRk83MlpGZ7lTwk7tiTlwsJIH

Malware Config

Extracted

Family

umbral

C2

https://ptb.discord.com/api/webhooks/1193833046810566716/Ip5p47J2qEw7d2YvXLGh3HLrizvUKpbZJnMXQxzQS4N9EYMFmhbB3hhBZhMwKm0ApaPL

Targets

    • Target

      0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb.exe

    • Size

      229KB

    • MD5

      ae3713305401315a3b520e84fb786fe5

    • SHA1

      914bd258c204e4cddab9dc0dbfb9c7134659ad57

    • SHA256

      0933217d8ea84d9341154ecc34a3f231cf2ff0e70d67dbe190265c7e26b96cfb

    • SHA512

      ae29d0c4c9106dcfbd4a212968d7d8b87236c2f39ce37435d3a658fe1b42875e44cc65c98f818391a8051312811b51da747efef5fa347f3a053b58454bd1e155

    • SSDEEP

      6144:dloZM3fsXtioRkts/cnnK6cMlpGZ7lTwk7tiTlwsJtSb8e1mdi:/oZ1tlRk83MlpGZ7lTwk7tiTlwsJIH

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks