General

  • Target

    KatanaBeta.exe

  • Size

    229KB

  • Sample

    240817-vytdaazgln

  • MD5

    f6f744441dfded289e9f80124b42cd7b

  • SHA1

    e097b009936023a9f7672bc1fb956ad45a07e9ad

  • SHA256

    a6691d55b146c79be7721277050c0f6c11130fa826cda7d78a4d529afefe3221

  • SHA512

    4cfec12b594cad710954dc25dee05b185c4917640d6ccd3778487a40ee73b0d08bc7cdd8787b2a9d331783d3de9d52535f8ed73b82a2de22331e4b81b49b1e6d

  • SSDEEP

    6144:FloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSni:HoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQi

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1267710453140951191/IIRxpE0xbpWEQdtzIur3qQkpJXN_Y7Z0eY8h8JOoQYGP2oBxcIKX2ZtY3K4AB1WZ5D5d

Targets

    • Target

      KatanaBeta.exe

    • Size

      229KB

    • MD5

      f6f744441dfded289e9f80124b42cd7b

    • SHA1

      e097b009936023a9f7672bc1fb956ad45a07e9ad

    • SHA256

      a6691d55b146c79be7721277050c0f6c11130fa826cda7d78a4d529afefe3221

    • SHA512

      4cfec12b594cad710954dc25dee05b185c4917640d6ccd3778487a40ee73b0d08bc7cdd8787b2a9d331783d3de9d52535f8ed73b82a2de22331e4b81b49b1e6d

    • SSDEEP

      6144:FloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSni:HoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQi

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks