General

  • Target

    rio+multi+tool.exe

  • Size

    557KB

  • Sample

    240815-xlzqmsserp

  • MD5

    903b9e6bdaf8721d44891f5da47fb6e5

  • SHA1

    4dde5721fbba23c63bf9ca62ec93a5ad72e6789d

  • SHA256

    c0351dccf1117ee1924671a77fa67db75d05a4be5297cee995d6ebfcb6f71587

  • SHA512

    006c1b8d1aebbdc0217cb6c44023e8e1a9916d82fa436ac5b065443b17f13da558039fa9a432e3790e6b8bb8aa6979e14122412815d5987b9fb693bf51312927

  • SSDEEP

    12288:PFUNDaqoZtL+EP8ty4/IuphChn6opNsie2hy:PFOauI8E4/IuphChn6opNsiHy

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1272102731623956590/orC-657JppMO4pzRWYZRPq2Bxa7aWiqEYrpgs9lbvLUqA7X_w4XsmqMix75fgCH2MVae

Targets

    • Target

      rio+multi+tool.exe

    • Size

      557KB

    • MD5

      903b9e6bdaf8721d44891f5da47fb6e5

    • SHA1

      4dde5721fbba23c63bf9ca62ec93a5ad72e6789d

    • SHA256

      c0351dccf1117ee1924671a77fa67db75d05a4be5297cee995d6ebfcb6f71587

    • SHA512

      006c1b8d1aebbdc0217cb6c44023e8e1a9916d82fa436ac5b065443b17f13da558039fa9a432e3790e6b8bb8aa6979e14122412815d5987b9fb693bf51312927

    • SSDEEP

      12288:PFUNDaqoZtL+EP8ty4/IuphChn6opNsie2hy:PFOauI8E4/IuphChn6opNsiHy

    • Detect Umbral payload

    • Modifies visiblity of hidden/system files in Explorer

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks