General

  • Target

    updated executor.exe

  • Size

    1.8MB

  • Sample

    240806-cjbwkswdpq

  • MD5

    f2a8b9e47973209ed9e9efef4ae2394b

  • SHA1

    3f16e6ba00dda08e079be4474e362266b761ec45

  • SHA256

    28fba0bec489228d8e5533f0ab8356127c257e15576a82c60b1216420ac01571

  • SHA512

    43713790091013c1b8c55607e36b08086e59e142369354303747034ac04557faec1a84482042103739bfdc54e0bcaae22515ca5e79afeee5bfbd835297efd39d

  • SSDEEP

    49152:kDjlabwz9YAoWpu/4ke0AaOTzwoKZpKCfRO2E:0qwy7Wpce0AaOT3CfUj

Malware Config

Targets

    • Target

      updated executor.exe

    • Size

      1.8MB

    • MD5

      f2a8b9e47973209ed9e9efef4ae2394b

    • SHA1

      3f16e6ba00dda08e079be4474e362266b761ec45

    • SHA256

      28fba0bec489228d8e5533f0ab8356127c257e15576a82c60b1216420ac01571

    • SHA512

      43713790091013c1b8c55607e36b08086e59e142369354303747034ac04557faec1a84482042103739bfdc54e0bcaae22515ca5e79afeee5bfbd835297efd39d

    • SSDEEP

      49152:kDjlabwz9YAoWpu/4ke0AaOTzwoKZpKCfRO2E:0qwy7Wpce0AaOT3CfUj

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks