General

  • Target

    mw3cheat.exe

  • Size

    229KB

  • Sample

    240903-bv5glavape

  • MD5

    5db80fba380203c721409c1365704c43

  • SHA1

    44bac65e76b5cdafbf484218601481e312a641cf

  • SHA256

    a55cbe38899777a55cdece2e1671d7490fe23f70565ded61a204773d8a1d1e2e

  • SHA512

    84d37a20299c04d27ea9949cd31b044f73cd4ecca3551678fd286ca92fd6c22b77c773142de053a1a6c810cdcfbdac34e8a71574022ce2099376eb28eb7b7ebe

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4Psue3iAfbodxUyzzqkQb8e1mt9i:noZtL+EP8Psue3iAfbodxUyzzqtyU

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1280335563387568138/vVcrjGXs8Mj6e1Q-qxwi6ThUirNYTobrVtGCqtsnn0FHOY2rPsJ3-LvhMY-KFj4gUH4f

Targets

    • Target

      mw3cheat.exe

    • Size

      229KB

    • MD5

      5db80fba380203c721409c1365704c43

    • SHA1

      44bac65e76b5cdafbf484218601481e312a641cf

    • SHA256

      a55cbe38899777a55cdece2e1671d7490fe23f70565ded61a204773d8a1d1e2e

    • SHA512

      84d37a20299c04d27ea9949cd31b044f73cd4ecca3551678fd286ca92fd6c22b77c773142de053a1a6c810cdcfbdac34e8a71574022ce2099376eb28eb7b7ebe

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4Psue3iAfbodxUyzzqkQb8e1mt9i:noZtL+EP8Psue3iAfbodxUyzzqtyU

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks