General

  • Target

    0445ee531f81638261d4989a90d2202e117837fc0f992640f26720935fc07fb4

  • Size

    288KB

  • Sample

    240814-ww31daweqb

  • MD5

    2c7d3d4ad2db30f12e3cae6540601762

  • SHA1

    7c7464861056574cd273eed99283c0498278ffb9

  • SHA256

    0445ee531f81638261d4989a90d2202e117837fc0f992640f26720935fc07fb4

  • SHA512

    97b30ef326820cb28dd13a9f7919a330adbc053536c62484258c08f7ff9813fc547a9364e7125a831a798f33ed848c6a29d90312ad43fdeed46e098437375dc1

  • SSDEEP

    6144:cloZM+rIkd8g+EtXHkv/iD41Rm89rI8j067NokRvBnb8e1m16oiolUaYmprYHtI:6oZtL+EP81Rm89rI8j067NokRx3oq8pr

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1269047079758594108/3Ng7lWTlbHkrMHpCEKNLV1cr1a_jBm12qDAIhwP87DidKDHnWwp3TKgULExiGg1xR1rJ

Targets

    • Target

      0445ee531f81638261d4989a90d2202e117837fc0f992640f26720935fc07fb4

    • Size

      288KB

    • MD5

      2c7d3d4ad2db30f12e3cae6540601762

    • SHA1

      7c7464861056574cd273eed99283c0498278ffb9

    • SHA256

      0445ee531f81638261d4989a90d2202e117837fc0f992640f26720935fc07fb4

    • SHA512

      97b30ef326820cb28dd13a9f7919a330adbc053536c62484258c08f7ff9813fc547a9364e7125a831a798f33ed848c6a29d90312ad43fdeed46e098437375dc1

    • SSDEEP

      6144:cloZM+rIkd8g+EtXHkv/iD41Rm89rI8j067NokRvBnb8e1m16oiolUaYmprYHtI:6oZtL+EP81Rm89rI8j067NokRx3oq8pr

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks