General

  • Target

    ccfdc56d44e882de28409431e7c52addcd5c569e7b96bf02cfbe25415954be3d

  • Size

    229KB

  • Sample

    240816-dwadyswgqq

  • MD5

    4a89926d7875b20715aee8b91055288a

  • SHA1

    bc9dd5dd8c03ba61a00284597816da69b26d3124

  • SHA256

    ccfdc56d44e882de28409431e7c52addcd5c569e7b96bf02cfbe25415954be3d

  • SHA512

    a4fdd5dfd1aeef9335dc1b9cb70c0e38cd548ce0ee58c003ac2d1b6cc7193e4585a7c1283d4030ffb13909089c625e9f99f371d677228fad5f8319f2d8d71bec

  • SSDEEP

    6144:tloZM+rIkd8g+EtXHkv/iD4Zb++zZqSteY5rWWDPtbb8e1mQLi:voZ1L+EP8Zb++zZqSteY5rWWD1xG

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1271897933410734140/cl8lD_srSsBnAcQoK8aC1AX5F5CCQ6wifYTnJIabDBXuTV0fUjWev4BeIYRk0fzhqntV

Targets

    • Target

      ccfdc56d44e882de28409431e7c52addcd5c569e7b96bf02cfbe25415954be3d

    • Size

      229KB

    • MD5

      4a89926d7875b20715aee8b91055288a

    • SHA1

      bc9dd5dd8c03ba61a00284597816da69b26d3124

    • SHA256

      ccfdc56d44e882de28409431e7c52addcd5c569e7b96bf02cfbe25415954be3d

    • SHA512

      a4fdd5dfd1aeef9335dc1b9cb70c0e38cd548ce0ee58c003ac2d1b6cc7193e4585a7c1283d4030ffb13909089c625e9f99f371d677228fad5f8319f2d8d71bec

    • SSDEEP

      6144:tloZM+rIkd8g+EtXHkv/iD4Zb++zZqSteY5rWWDPtbb8e1mQLi:voZ1L+EP8Zb++zZqSteY5rWWD1xG

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks