General

  • Target

    ea94c83ccab9fd5d21c2776d6e288ccdd95c8aa827b8e314316435424c0f9093

  • Size

    187KB

  • Sample

    240809-bar1rsxdkd

  • MD5

    758180c588bfffa96aa400d55513502f

  • SHA1

    558e8ce1e7db1e04ab612390855052a6fcde25a4

  • SHA256

    ea94c83ccab9fd5d21c2776d6e288ccdd95c8aa827b8e314316435424c0f9093

  • SHA512

    d66210dc71ecafd017dbd63301f8072550670ee900d254bb2649e27a9c6ae69dcb86f8b9d1f35663fec979fa6f8dda4e6e49865744f72c4b17ef450ddb678f68

  • SSDEEP

    3072:PV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnP9vg0UasVmkoYcMK/C:Ct5hBPi0BW69hd1MMdxPe9N9uA069TBE

Malware Config

Targets

    • Target

      ea94c83ccab9fd5d21c2776d6e288ccdd95c8aa827b8e314316435424c0f9093

    • Size

      187KB

    • MD5

      758180c588bfffa96aa400d55513502f

    • SHA1

      558e8ce1e7db1e04ab612390855052a6fcde25a4

    • SHA256

      ea94c83ccab9fd5d21c2776d6e288ccdd95c8aa827b8e314316435424c0f9093

    • SHA512

      d66210dc71ecafd017dbd63301f8072550670ee900d254bb2649e27a9c6ae69dcb86f8b9d1f35663fec979fa6f8dda4e6e49865744f72c4b17ef450ddb678f68

    • SSDEEP

      3072:PV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnP9vg0UasVmkoYcMK/C:Ct5hBPi0BW69hd1MMdxPe9N9uA069TBE

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Download via BitsAdmin

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks