General

  • Target

    Ref-Quotation.pdf

  • Size

    7KB

  • Sample

    240806-t8rrrstgrl

  • MD5

    3afee0850cb4ac806103dd7029c99dec

  • SHA1

    81db120f09c5ee62d785ea7fc76d2065362d8d3c

  • SHA256

    c00313aabcfd55989bbd839a80dcdd52fe4f08911bba68a5f9acfcc463cf8602

  • SHA512

    a410572f6aec8153fc5a6f5744ea9064d9730d6c6258a4ac5f244840105afb15fc726e0b9d4b0d28084aeb2dfceceff249b25bcd5b15f846fcc08e6a1004a502

  • SSDEEP

    96:YEcrIq5gt/vsHuMp18EtTkYVkZmsJSJlkOCKeLDkaITVIcxe4vnWcrV:2Iq5OvsppmEJl2rAZoDkj7nTV

Malware Config

Targets

    • Target

      Ref-Quotation.pdf

    • Size

      7KB

    • MD5

      3afee0850cb4ac806103dd7029c99dec

    • SHA1

      81db120f09c5ee62d785ea7fc76d2065362d8d3c

    • SHA256

      c00313aabcfd55989bbd839a80dcdd52fe4f08911bba68a5f9acfcc463cf8602

    • SHA512

      a410572f6aec8153fc5a6f5744ea9064d9730d6c6258a4ac5f244840105afb15fc726e0b9d4b0d28084aeb2dfceceff249b25bcd5b15f846fcc08e6a1004a502

    • SSDEEP

      96:YEcrIq5gt/vsHuMp18EtTkYVkZmsJSJlkOCKeLDkaITVIcxe4vnWcrV:2Iq5OvsppmEJl2rAZoDkj7nTV

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks