General

  • Target

    eba38446b23a272418ba61781ccf6350N.exe

  • Size

    231KB

  • Sample

    240828-zz1afawemd

  • MD5

    eba38446b23a272418ba61781ccf6350

  • SHA1

    fd17a55b20a1b42d0cd1199e6e5258804949f2f1

  • SHA256

    0459819aa58da70fda8417237b745032864dd32efdfe87f707161871f749e0b2

  • SHA512

    0f451718aa0bcee81d5795c560c1ca79d397ec1a39b50631e204f5bc8d870093015614a40aa9f68260afb236dc433cbc82e8227b648203e545333567d555fa1a

  • SSDEEP

    6144:oloZM+rIkd8g+EtXHkv/iD4mjOmZHMgPru35EwFjUb8e1mzPi:2oZtL+EP8mjOmZHMgPru35EwFQUa

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1231624741173985371/s6WJz8yAPRvHJWZ2Nyb2OMvaFnZ7WkllA_2ERReFiu-0o-mXafJZDb374OawjCaZ8fwr

Targets

    • Target

      eba38446b23a272418ba61781ccf6350N.exe

    • Size

      231KB

    • MD5

      eba38446b23a272418ba61781ccf6350

    • SHA1

      fd17a55b20a1b42d0cd1199e6e5258804949f2f1

    • SHA256

      0459819aa58da70fda8417237b745032864dd32efdfe87f707161871f749e0b2

    • SHA512

      0f451718aa0bcee81d5795c560c1ca79d397ec1a39b50631e204f5bc8d870093015614a40aa9f68260afb236dc433cbc82e8227b648203e545333567d555fa1a

    • SSDEEP

      6144:oloZM+rIkd8g+EtXHkv/iD4mjOmZHMgPru35EwFjUb8e1mzPi:2oZtL+EP8mjOmZHMgPru35EwFQUa

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks