General

  • Target

    Umbral.exe

  • Size

    232KB

  • Sample

    240831-2d1eesygrh

  • MD5

    c06d5c52b73ea9b584856d085b5e602a

  • SHA1

    11d87e26def16f81e25be667b92ae0a1f18b4f53

  • SHA256

    183ef3c129d5ae9cc4070d9f1c2f276fe2ee4f72b9a1498c7f88d808e9f65a92

  • SHA512

    0aa2513e17baae624c66a9284ad440f7112d80f5b3fff59a4285876b61ae7512ae6ce226d2a89c77506a19810813db7d18b912394f7c323b57fdcc13ac8d6a76

  • SSDEEP

    6144:RloZMArIkd8g+EtXHkv/iD4K6k+1ZHMgPfu35EwF1zb8e1mKFo6i:joZHL+EP8K6k+1ZHMgPfu35EwF9pFK

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1279568429354844182/gSnzh1xY7wMGz_YPr9a4ZZj2EtDdemR6YarKMztp7mGHc1jyKMJVL68a_kJvpSVi8rKV

Targets

    • Target

      Umbral.exe

    • Size

      232KB

    • MD5

      c06d5c52b73ea9b584856d085b5e602a

    • SHA1

      11d87e26def16f81e25be667b92ae0a1f18b4f53

    • SHA256

      183ef3c129d5ae9cc4070d9f1c2f276fe2ee4f72b9a1498c7f88d808e9f65a92

    • SHA512

      0aa2513e17baae624c66a9284ad440f7112d80f5b3fff59a4285876b61ae7512ae6ce226d2a89c77506a19810813db7d18b912394f7c323b57fdcc13ac8d6a76

    • SSDEEP

      6144:RloZMArIkd8g+EtXHkv/iD4K6k+1ZHMgPfu35EwF1zb8e1mKFo6i:joZHL+EP8K6k+1ZHMgPfu35EwF9pFK

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks