General

  • Target

    PaypalChecker.zip

  • Size

    3.4MB

  • Sample

    240824-t9fe5a1eql

  • MD5

    2eac9882988865735a9fcac9b27c8513

  • SHA1

    c61472ba372f13996a34d434df0b2e425fba2d00

  • SHA256

    5e2d0c0c469f7124301525e041d4184eff6ccf3c930f269dcf20a8ae4aed704f

  • SHA512

    fafef510d02a945dcbc53a4f22f53a476c0c894f8c27f6df40a0af84b4b520450dba20c7094d3da1b1a4ef4ffb26b05e5bdad8cdc9ae03fd8b73d21d371baa15

  • SSDEEP

    98304:Xc7oZLxDk40d7JslYeCP6gxD38GeEYvop/3cc0YuQnj3k8DHEFc:TZLxTkN4YeQ6gR8GRYvop/LKQnz5LMc

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1271546218732060682/Q59krQGS2fgaa85eefEolChXWvoWRK_k6m6qA1hperoqPEnOrm9iJBnm0weV30aGJei1

Targets

    • Target

      PaypalChecker/PaypalChecker.exe

    • Size

      241KB

    • MD5

      51b45616b6902c84fed4f09c0ae52fca

    • SHA1

      39f490a578c996ec11601b203c600c7746cb9802

    • SHA256

      4b7bc1185048cb51fde3554326846cf426d7e1d3aa372349adb8c6e921762ce6

    • SHA512

      b7e6e95072e0b27bb2aad79e6f1ad6f17000bd724e752679ddaead7c50655e52a37b5b082db7c1173992873bc4c61ded852cd605b4b5620f176772be0d31df31

    • SSDEEP

      6144:wloZM+rIkd8g+EtXHkv/iD4YMVIp3cw/9eHp0AV39b8e1mSfi5F:+oZtL+EP8YMVIp3cw/9eHp0AVNpKr

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks