General

  • Target

    Twitch-Patcheur-30.2.2-Windows-Installer.exe

  • Size

    187KB

  • Sample

    240809-19xsqsscmm

  • MD5

    2dde97d542da5e24e9a7b8dc754cfe23

  • SHA1

    5f73f214ba314bacbc8367e5c97ba0283dd0a6e5

  • SHA256

    165ba0408d39838ba395b44d1666c06e6a9d0db34907020bc524763d97c286a6

  • SHA512

    58754183f468c4bb0b063f0d2507df97b2bef7f6ba25f4ceaaacb66d07f6a1ba470bf5bda1d68837046f90b797e3bb13a6da5315dbcc421ebf323190ab3c8797

  • SSDEEP

    3072:PV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPu43g0UasVmkoYcMK0:Ct5hBPi0BW69hd1MMdxPe9N9uA069TBg

Malware Config

Targets

    • Target

      Twitch-Patcheur-30.2.2-Windows-Installer.exe

    • Size

      187KB

    • MD5

      2dde97d542da5e24e9a7b8dc754cfe23

    • SHA1

      5f73f214ba314bacbc8367e5c97ba0283dd0a6e5

    • SHA256

      165ba0408d39838ba395b44d1666c06e6a9d0db34907020bc524763d97c286a6

    • SHA512

      58754183f468c4bb0b063f0d2507df97b2bef7f6ba25f4ceaaacb66d07f6a1ba470bf5bda1d68837046f90b797e3bb13a6da5315dbcc421ebf323190ab3c8797

    • SSDEEP

      3072:PV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPu43g0UasVmkoYcMK0:Ct5hBPi0BW69hd1MMdxPe9N9uA069TBg

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Download via BitsAdmin

    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Drops startup file

    • Executes dropped EXE

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks