General

  • Target

    freecheat.exe

  • Size

    229KB

  • Sample

    240820-z18m7stcnh

  • MD5

    663aef72cbcab67af4599975ce5786bc

  • SHA1

    af90b484dd8e9d7e29ee83855c7ec6d48a099861

  • SHA256

    59f753961fb11dab712f961493856dd8e73904674558b5a40a1a2093acc556bf

  • SHA512

    3ca80c4a05541235cfc10e27be099cf99f0697c82873229d334fb5cc844c11ecd0695151a0c9d4765b0c271b9ac5f3d198e75ac2052919155de0d15003820586

  • SSDEEP

    6144:lloZMCrIkd8g+EtXHkv/iD4kM3hOsTPksFQu//Ou3b8e1mT2Si:noZZL+EP8kM3hOsTPksFQu//OMI2H

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1275168311696425041/tA4PWr6LxJ2Q5Tdr4GYDveo-_VPhwcsbhvMV-EYglJeO6Jpp8OFgPQDX7XwqV4lZk1m9

Targets

    • Target

      freecheat.exe

    • Size

      229KB

    • MD5

      663aef72cbcab67af4599975ce5786bc

    • SHA1

      af90b484dd8e9d7e29ee83855c7ec6d48a099861

    • SHA256

      59f753961fb11dab712f961493856dd8e73904674558b5a40a1a2093acc556bf

    • SHA512

      3ca80c4a05541235cfc10e27be099cf99f0697c82873229d334fb5cc844c11ecd0695151a0c9d4765b0c271b9ac5f3d198e75ac2052919155de0d15003820586

    • SSDEEP

      6144:lloZMCrIkd8g+EtXHkv/iD4kM3hOsTPksFQu//Ou3b8e1mT2Si:noZZL+EP8kM3hOsTPksFQu//OMI2H

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks