General
-
Target
Umbral.exe
-
Size
231KB
-
Sample
240821-jhcj2szhlp
-
MD5
dae35caa4639b153b0531ec0ed895a79
-
SHA1
03326ba6ddbc338f6165697e86a1439826c7af2b
-
SHA256
23f54c809daf84b074a3286df27497739b43f5f98a521e29050a5083f2d405e7
-
SHA512
a270a4212187e2292f1b9884c916232fbabfdc45356a32896150c7b7d93a3d9abe173281bff90f7ab35654abce82cba9c55ebeb98de8c612241277ea48bc5d12
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4bhIqlZ8e1mKgi:DoZtL+EP8v7/
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1275720614551883826/vuNizSZ740IKG41dpOGRQ8sBT4W3nJJfbP7siP2Rhxa8jA_bgZRZCXjRe0cbnqdoARSM
Targets
-
-
Target
Umbral.exe
-
Size
231KB
-
MD5
dae35caa4639b153b0531ec0ed895a79
-
SHA1
03326ba6ddbc338f6165697e86a1439826c7af2b
-
SHA256
23f54c809daf84b074a3286df27497739b43f5f98a521e29050a5083f2d405e7
-
SHA512
a270a4212187e2292f1b9884c916232fbabfdc45356a32896150c7b7d93a3d9abe173281bff90f7ab35654abce82cba9c55ebeb98de8c612241277ea48bc5d12
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4bhIqlZ8e1mKgi:DoZtL+EP8v7/
-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1