General

  • Target

    Katana Cod.zip

  • Size

    230KB

  • Sample

    240817-vxmt4sxcna

  • MD5

    a389ce9a2572a8eed2b7800ba5b34a6e

  • SHA1

    27cd21988ae7c5c16ce6a0320253766881180de9

  • SHA256

    92b29151b184cbbc1227cdf1fec858cb8145d5f03516b9199dba669dae30f6b8

  • SHA512

    d9f5a88362e9276786f56ccd93a8b3d9d3138a240b12025b68c7b8af00eee02bd28b24b1ab16e266e4330becf594b9ecd0ca8b99c9fe80db6fb91efe3537a926

  • SSDEEP

    6144:TloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSniB:RoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQiB

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1267710453140951191/IIRxpE0xbpWEQdtzIur3qQkpJXN_Y7Z0eY8h8JOoQYGP2oBxcIKX2ZtY3K4AB1WZ5D5d

Targets

    • Target

      Katana Cod/KatanaBeta.exe

    • Size

      229KB

    • MD5

      f6f744441dfded289e9f80124b42cd7b

    • SHA1

      e097b009936023a9f7672bc1fb956ad45a07e9ad

    • SHA256

      a6691d55b146c79be7721277050c0f6c11130fa826cda7d78a4d529afefe3221

    • SHA512

      4cfec12b594cad710954dc25dee05b185c4917640d6ccd3778487a40ee73b0d08bc7cdd8787b2a9d331783d3de9d52535f8ed73b82a2de22331e4b81b49b1e6d

    • SSDEEP

      6144:FloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSni:HoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQi

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      Katana Cod/Key.bat

    • Size

      170B

    • MD5

      2764b21ad2de14120c5112b2c1f6dc86

    • SHA1

      b8abe759e209d15a680e2489b92b09e459eeb78d

    • SHA256

      dac55f22844c85a10ba5e31c7d8bb4736006c95ebaa40a8ec1170949825b971f

    • SHA512

      efbc9f35ccb1e2f075f18750bf250d2223a50f6a164cfd1781197e3eec171d945e8c3854608df0281eca2bc55e8901d5f81761841d5f78e66e04f9a8a1c3d428

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks