General

  • Target

    0x000f000000015c87-15.dat

  • Size

    229KB

  • Sample

    240806-kbtqesybpb

  • MD5

    f48ef033300ec9fd3c77afff5c20e95f

  • SHA1

    22d6125b980474b3f54937003a765cdd5352f9a8

  • SHA256

    72ee11a905ca278130f02397422b4cc4944851065ce0072f9888b70c5ad40f1e

  • SHA512

    847ee8cdb14879089c861168d6be90325304df490668a38447b37772423e6dab5e32a5df344ceb58410d3b24cf25cd7221e8768951e5aca14820996a1e8304bc

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4In5D4+ZRSy3q459cApb8e1m1i:noZtL+EP8In5D4+ZRSy3q459cEX

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1221847080373584144/7stbODqa-C2IH_V1s7-AaD6fECqR68YLov_s341xewFGvFGlgl7fRFcAsV3CtRNlSgzQ

Targets

    • Target

      0x000f000000015c87-15.dat

    • Size

      229KB

    • MD5

      f48ef033300ec9fd3c77afff5c20e95f

    • SHA1

      22d6125b980474b3f54937003a765cdd5352f9a8

    • SHA256

      72ee11a905ca278130f02397422b4cc4944851065ce0072f9888b70c5ad40f1e

    • SHA512

      847ee8cdb14879089c861168d6be90325304df490668a38447b37772423e6dab5e32a5df344ceb58410d3b24cf25cd7221e8768951e5aca14820996a1e8304bc

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4In5D4+ZRSy3q459cApb8e1m1i:noZtL+EP8In5D4+ZRSy3q459cEX

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks