General

  • Target

    WindowsFormsApp5.exe

  • Size

    8KB

  • Sample

    240831-2h24tazarc

  • MD5

    ef8b399d71141333959e41ec67917581

  • SHA1

    896e70fe19495589eb4fd338f0ca4a09f406f983

  • SHA256

    68be9bbac51892ca8e7f461d1509ae1058ba7b0a435658beebf10423ff5bad01

  • SHA512

    7fa42a455bfa0c7e7fa8c67cbd0f2f3d61b8cf9afe8974e2f7a8381484a76adb3f155d71128599734d9b1b2e4eb494ed33c64f0f8148c1cf964cb57925d2fe16

  • SSDEEP

    192:uJy2O0tL1YLu0pWzkLzLeLo/rrVCsfznxT12a5k:Ey2XtL+LjpWzkLzLeLorrVxfznxc

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1279545169913450556/F_7JgLiTKgmmhN5sN7p6WPAM8OYTa9TQPfck7MU2KymIAhgn1OZL-VqUQz_C_syu1_N1

Targets

    • Target

      WindowsFormsApp5.exe

    • Size

      8KB

    • MD5

      ef8b399d71141333959e41ec67917581

    • SHA1

      896e70fe19495589eb4fd338f0ca4a09f406f983

    • SHA256

      68be9bbac51892ca8e7f461d1509ae1058ba7b0a435658beebf10423ff5bad01

    • SHA512

      7fa42a455bfa0c7e7fa8c67cbd0f2f3d61b8cf9afe8974e2f7a8381484a76adb3f155d71128599734d9b1b2e4eb494ed33c64f0f8148c1cf964cb57925d2fe16

    • SSDEEP

      192:uJy2O0tL1YLu0pWzkLzLeLo/rrVCsfznxT12a5k:Ey2XtL+LjpWzkLzLeLorrVxfznxc

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks