General

  • Target

    9fa6035e3150c3e57724bd3f4f67647ed925c9c9447f00b3df7715d03b6ebf53

  • Size

    234KB

  • Sample

    240826-y6xx8avgmj

  • MD5

    18a5e3fd22133b48de0ac3ae4e41c997

  • SHA1

    6664c80cf7567077385cc5f82aba04d525a7a8a9

  • SHA256

    9fa6035e3150c3e57724bd3f4f67647ed925c9c9447f00b3df7715d03b6ebf53

  • SHA512

    c359ef3b9b5736b63e8906f6d35e6fb9b6f286f4fd382f5f445f2a5c9e38673a04f90215349c417c19e67cd9e123925521084167ac2dce0af842d18eb3c070b9

  • SSDEEP

    6144:zloZM+rIkd8g+EtXHkv/iD4VsEnYe5xysXKYZd85Wn+l78e1mUDiM:xoZtL+EP8mEnYe5xysXKYZd85zJiM

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1277392669051588690/FA7JPNKgRkIWF6TZtZf-R2-COXm_0RmJgRD2Xg8FbKAIoqjl7PPy7FAMl1QANkBaTKhi

Targets

    • Target

      9fa6035e3150c3e57724bd3f4f67647ed925c9c9447f00b3df7715d03b6ebf53

    • Size

      234KB

    • MD5

      18a5e3fd22133b48de0ac3ae4e41c997

    • SHA1

      6664c80cf7567077385cc5f82aba04d525a7a8a9

    • SHA256

      9fa6035e3150c3e57724bd3f4f67647ed925c9c9447f00b3df7715d03b6ebf53

    • SHA512

      c359ef3b9b5736b63e8906f6d35e6fb9b6f286f4fd382f5f445f2a5c9e38673a04f90215349c417c19e67cd9e123925521084167ac2dce0af842d18eb3c070b9

    • SSDEEP

      6144:zloZM+rIkd8g+EtXHkv/iD4VsEnYe5xysXKYZd85Wn+l78e1mUDiM:xoZtL+EP8mEnYe5xysXKYZd85zJiM

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks