General

  • Target

    zetcheats.rar

  • Size

    234KB

  • Sample

    240825-rbfxwsxhje

  • MD5

    9021e511366e5bca56a3aee33bcd02d1

  • SHA1

    49d4ec33d0d1bc0f80560ce87ee751be559ade48

  • SHA256

    732efb009641d9d8d38ad223649018ce8d0521f0e03c34112221d0525dda7855

  • SHA512

    803fd74d45ad9acde6d74fb29b08ffc6906650e5d353d8da35bf4b4dc6021948879446efa58a099747db606573b6f42ed00add3d1d30f5f00be3cdd90484f2ae

  • SSDEEP

    3072:QcJ0FH2Not2cvyAglXz4KtJ9BMqc7OBcERQP4/w6+TH2lFh2c5JHNYn1YJ60a:gdNqAgtz4KN5pBhRKx6gH4bzTHNY0a

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1276853076103397458/6HXVSbE_AkPTnHXPWSqE7R6BZEz8c-DN__uq16DZfNyzHcoPxLFW5-ZbkHlh1PYswhx8

Targets

    • Target

      zetcheats/zetcheats.exe

    • Size

      229KB

    • MD5

      a5136c56ea838074a1b521860a45086c

    • SHA1

      576f08a6e5e4ee6f0a438e5c58506e059497d015

    • SHA256

      d4f221f62d10617dbbac44172e5e1d5b106a47c69ac4a2426eff77c9485c0707

    • SHA512

      1dd818b836c898b85459d42f8163be1926149b569c3f918b994f89ddaea7939a27324b6964140008fa394cda77aa84f468361416a7db5ddcc8bba9ff5bc4c5c3

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4ClRVw2xpacPyAxVkQIb8e1mvi:noZtL+EP8ClRVw2xpacPyAxVklN

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks