General

  • Target

    a8c74a05f574514ec74cb942ec0ff1d5380da648e145ba829dec4cc511ec4cd7

  • Size

    92KB

  • Sample

    240829-f4ae2awamg

  • MD5

    428c94c72ecc3c8056e7b9bf927628c4

  • SHA1

    78360122f0dee4a0ef75b1de4e062b1c6ecc58e5

  • SHA256

    a8c74a05f574514ec74cb942ec0ff1d5380da648e145ba829dec4cc511ec4cd7

  • SHA512

    6ed4159197625f6379dc7d509ee01c123fadd7b6cfb6658e7ad7b3b8997d75cea900f15b684c493d9599386f172c86d439598d770c1166144f3a4526b3030561

  • SSDEEP

    1536:iuyd8rwgjEoMo3DM76gO9cKc51RqbtIQ80i+gcxfYacF6oufFB7jPV+sUq01UEic:ogjdMGg4cKc5gIzDhau0BPPiLSk3h

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1240617539009249350/TqBzgc6PPLDK8U9sL3OIQ7VPVwnDIoONcaMLCG9G1Uo5vMQ9KEFuAEkuqQ_6XKEkyetX

Targets

    • Target

      5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe

    • Size

      229KB

    • MD5

      eabe2a81aa3dabab25e49ee4b36ce075

    • SHA1

      f55b6298f0a8330d90d39e20a73adb2e828dfd1c

    • SHA256

      5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686

    • SHA512

      9688119150d3a466d9a12bfc55933d367104747a2cf319467a78dfcf975361c9e2727f76efe380db9d0c92c39dc4b0241bfb444e965e92720c9edcf42c1d18fe

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4Wn0IZHMgPou35EwFyov28e1mpi:noZtL+EP8Wn0IZHMgPou35EwFm1

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks