General

  • Target

    Optimization_Pc_Twea.exe

  • Size

    240KB

  • Sample

    240827-y4wblszenc

  • MD5

    3ab1d460b16ec34493d9d769729a53fc

  • SHA1

    e7e379fb8d8390103e53c31f07a52dbd1bc796a1

  • SHA256

    3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9

  • SHA512

    37d59d665ed891832e3e8efd6b74116bb51230a69b1c5fff53e2aaf8eaaade4d807215dae3bbd26ec5812f8bae55f2d982e975d38c0d6ce684b5b2cea93f2949

  • SSDEEP

    6144:vloZMNrIkd8g+EtXHkv/iD4lx4+Clg8e1mbTi:NoZmL+EP8DMwK+

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1277937947240304723/e6aSIKSZZUhEGqX-EkfVX3BFZe9q4cDzASzi5ZjH0SMC7YexS-B3SgsSoakwIqMdOrMu

Targets

    • Target

      Optimization_Pc_Twea.exe

    • Size

      240KB

    • MD5

      3ab1d460b16ec34493d9d769729a53fc

    • SHA1

      e7e379fb8d8390103e53c31f07a52dbd1bc796a1

    • SHA256

      3d33b7e8a8541de77e1428e6998cf1d77e1e3c7121ff42bb92285614db513bc9

    • SHA512

      37d59d665ed891832e3e8efd6b74116bb51230a69b1c5fff53e2aaf8eaaade4d807215dae3bbd26ec5812f8bae55f2d982e975d38c0d6ce684b5b2cea93f2949

    • SSDEEP

      6144:vloZMNrIkd8g+EtXHkv/iD4lx4+Clg8e1mbTi:NoZmL+EP8DMwK+

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks