General

  • Target

    b575e722311556b67bc4f2ff77470063e5453e8f9952ddcd33afec9bdefc3902.exe

  • Size

    231KB

  • Sample

    240827-dg33qazakb

  • MD5

    2a9d5da0bb69d53e1b68178bc63e9390

  • SHA1

    b1170f7ca36ea613188a272dc8ff8720a586de3a

  • SHA256

    b575e722311556b67bc4f2ff77470063e5453e8f9952ddcd33afec9bdefc3902

  • SHA512

    372288f96c8d39cba9529e7c44ce4b083eddf50dc3c3317b7b97c02d07018cdc2e0913da3e8309d548f80d68c95b9dd65e4febd4d7ca3b4d6a8df3360cf6aca3

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4ZvHYe5xypXKYZd8ZC6lY8e1mGi:joZtL+EP8pHYe5xypXKYZd8dk2

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1270399724431867935/HjClfkOVqhZa8ElKgkYuPRyoXVGf7yB2AqieOsUFaDEyif-Oe__Dw5TFjFKt_Mc4n-Dr

Targets

    • Target

      b575e722311556b67bc4f2ff77470063e5453e8f9952ddcd33afec9bdefc3902.exe

    • Size

      231KB

    • MD5

      2a9d5da0bb69d53e1b68178bc63e9390

    • SHA1

      b1170f7ca36ea613188a272dc8ff8720a586de3a

    • SHA256

      b575e722311556b67bc4f2ff77470063e5453e8f9952ddcd33afec9bdefc3902

    • SHA512

      372288f96c8d39cba9529e7c44ce4b083eddf50dc3c3317b7b97c02d07018cdc2e0913da3e8309d548f80d68c95b9dd65e4febd4d7ca3b4d6a8df3360cf6aca3

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD4ZvHYe5xypXKYZd8ZC6lY8e1mGi:joZtL+EP8pHYe5xypXKYZd8dk2

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks