General

  • Target

    Nowatermarks.temp

  • Size

    229KB

  • Sample

    240809-wjp8ratcnp

  • MD5

    79d545d3f6a46db17e8dadba1bf623ae

  • SHA1

    f289247a7620ff890ac3d5c87c13445c83b2a02d

  • SHA256

    1e94a2848737d3fe8046f4dabcfe94c250be5085802edce428e4dd271f459a19

  • SHA512

    bd14dec25736a52f79f8b9e4aede9981ffca9ff78e2dbca875802eff7525495a17c506c69b74b572c5e18aca2c7df05b11adaa1160a65f9e2df1f4e8b5b1f447

  • SSDEEP

    6144:lloZMrrIkd8g+EtXHkv/iD4ITZHR/k4XSG/BcoNTo6lm8e1mCKi:noZcL+EP8QZHR/k4XSG/BcoNVSHv

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1271195767931146271/iNqcQXHndflroU3wKuHImLpW56jZ6ZCv7xkqHYGTn6YCeSATY-dipTigRMDm-yI4L0v7

Targets

    • Target

      Nowatermarks.temp

    • Size

      229KB

    • MD5

      79d545d3f6a46db17e8dadba1bf623ae

    • SHA1

      f289247a7620ff890ac3d5c87c13445c83b2a02d

    • SHA256

      1e94a2848737d3fe8046f4dabcfe94c250be5085802edce428e4dd271f459a19

    • SHA512

      bd14dec25736a52f79f8b9e4aede9981ffca9ff78e2dbca875802eff7525495a17c506c69b74b572c5e18aca2c7df05b11adaa1160a65f9e2df1f4e8b5b1f447

    • SSDEEP

      6144:lloZMrrIkd8g+EtXHkv/iD4ITZHR/k4XSG/BcoNTo6lm8e1mCKi:noZcL+EP8QZHR/k4XSG/BcoNVSHv

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks