General

  • Target

    fd5d2801e25b13aa35b9e5cc40103690N.exe

  • Size

    231KB

  • Sample

    240815-sqd8aatalr

  • MD5

    fd5d2801e25b13aa35b9e5cc40103690

  • SHA1

    9bafc097f3f22caaacfb262dbe9bb4404c65a5d6

  • SHA256

    09a094b3db589ae741341a5b319dd0baa2f3a22695363df32e76a62d319e49ee

  • SHA512

    1f9e1f6d5de55c790361a95b9a5ab627617cafc9dd34a72fdf0dd0878b129423779d1006c2e5aa0ecc90b90500b12d6f6910cab0b81dd0f68bb0f0b670620761

  • SSDEEP

    6144:xloZM3fsXtioRkts/cnnK6cMlh6gQdwwVLxCqVGQhTuOLf2b8e1mZgQi:DoZ1tlRk83Mlh6gQdwwVLxCqVGQhTuO

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1269299463067930707/EQ7y8IvC59W0J5AMSFAkNW7PKwLRo4Tp4pRVebZOh5PyBQ123Skhj9jOTSUzPlbJ0zJj

Targets

    • Target

      fd5d2801e25b13aa35b9e5cc40103690N.exe

    • Size

      231KB

    • MD5

      fd5d2801e25b13aa35b9e5cc40103690

    • SHA1

      9bafc097f3f22caaacfb262dbe9bb4404c65a5d6

    • SHA256

      09a094b3db589ae741341a5b319dd0baa2f3a22695363df32e76a62d319e49ee

    • SHA512

      1f9e1f6d5de55c790361a95b9a5ab627617cafc9dd34a72fdf0dd0878b129423779d1006c2e5aa0ecc90b90500b12d6f6910cab0b81dd0f68bb0f0b670620761

    • SSDEEP

      6144:xloZM3fsXtioRkts/cnnK6cMlh6gQdwwVLxCqVGQhTuOLf2b8e1mZgQi:DoZ1tlRk83Mlh6gQdwwVLxCqVGQhTuO

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks