General

  • Target

    gaming code - Copy.exe

  • Size

    493KB

  • Sample

    240813-2qey9avepr

  • MD5

    7b2b4e725655f63a945798bb6ba47dbc

  • SHA1

    4abbeff4849c0be54600e4763104c8cf57e7b741

  • SHA256

    c1e68c823f44e06715698c6685c9507ad6406e61b343aa1d69a2ff9a846407db

  • SHA512

    adc86f43f0e00ecf7ec0484bb19acfce94f7156ac740606e094ea80cdb2794b0b0082d010137702f3f6f3d6f903d1c6ba841fa13141f8d10ddd7e04f1577442a

  • SSDEEP

    12288:zoZtL+EP83ZeP4+ZRSd3q459cOI7k0u5DD7Z446cK+hjqiU:9I8peP4+ZRSd3q459cOIw0u5DD7Z446l

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1272345063858638869/l-oiQrUcEdcZBLQWfd1460QMlq2XcFjaVAy_aV94D3lRygxhXqjWiXk2DnbyaCoM95g-

Targets

    • Target

      gaming code - Copy.exe

    • Size

      493KB

    • MD5

      7b2b4e725655f63a945798bb6ba47dbc

    • SHA1

      4abbeff4849c0be54600e4763104c8cf57e7b741

    • SHA256

      c1e68c823f44e06715698c6685c9507ad6406e61b343aa1d69a2ff9a846407db

    • SHA512

      adc86f43f0e00ecf7ec0484bb19acfce94f7156ac740606e094ea80cdb2794b0b0082d010137702f3f6f3d6f903d1c6ba841fa13141f8d10ddd7e04f1577442a

    • SSDEEP

      12288:zoZtL+EP83ZeP4+ZRSd3q459cOI7k0u5DD7Z446cK+hjqiU:9I8peP4+ZRSd3q459cOIw0u5DD7Z446l

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks