General

  • Target

    3fa004ae1034e479a4c536a09468edbc5e55271c7833d6768252a1f7aa1ec3ea

  • Size

    229KB

  • Sample

    240902-zskamsyakd

  • MD5

    8887b7baff5156a22acd0a8f5f59d606

  • SHA1

    a77181461892efdd781892b9b676a78fce0615ae

  • SHA256

    3fa004ae1034e479a4c536a09468edbc5e55271c7833d6768252a1f7aa1ec3ea

  • SHA512

    0f0f2055533ae30088a1daeb30aee278bc3c4e2f319dbd2f436880b6386774535a7e30ae964cf09ad6dd8f5038bba0a1c6abf919c5c4e223ebf58c9dcf629a0b

  • SSDEEP

    6144:FloZM+rIkd8g+EtXHkv/iD4HzVViAfbopxUyzzql8rb8e1mTi:HoZtL+EP8HzVViAfbopxUyzzqo9

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1278952898910490668/Fr9npPcktT2QnX_X-7sSKX5VEg-HxJcUTrcTmXyrOUMmCDuT3r7OTurtu0f7imdrxuSr

Targets

    • Target

      3fa004ae1034e479a4c536a09468edbc5e55271c7833d6768252a1f7aa1ec3ea

    • Size

      229KB

    • MD5

      8887b7baff5156a22acd0a8f5f59d606

    • SHA1

      a77181461892efdd781892b9b676a78fce0615ae

    • SHA256

      3fa004ae1034e479a4c536a09468edbc5e55271c7833d6768252a1f7aa1ec3ea

    • SHA512

      0f0f2055533ae30088a1daeb30aee278bc3c4e2f319dbd2f436880b6386774535a7e30ae964cf09ad6dd8f5038bba0a1c6abf919c5c4e223ebf58c9dcf629a0b

    • SSDEEP

      6144:FloZM+rIkd8g+EtXHkv/iD4HzVViAfbopxUyzzql8rb8e1mTi:HoZtL+EP8HzVViAfbopxUyzzqo9

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks