General

  • Target

    umbralstealer.exe

  • Size

    229KB

  • Sample

    240903-qbvwdaydlg

  • MD5

    83b81dda82a62350b52ee97a12d3163a

  • SHA1

    3e7c9d5eda676771071fa77ce8f357b0c32673fa

  • SHA256

    b8e51135b2e0a124ac1103a9c4a6f2353d289ffe99611d990c291ae356950ecf

  • SHA512

    e0d0d47479b19287dbb731b0025c458623fa17e77d506756a7e90289abf0c04faa5e655bd2f521ead68d3c8530cb4ecaf1cb1c48e1fe2e03759affe8c0c4ca04

  • SSDEEP

    6144:lloZM9fsXtioRkts/cnnK6cMlxDKxX8il927De8NhoREb8e1muoi:noZXtlRk83MlxDKxX8il927De8NhoOJ

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1255559936801505321/F16TxDgiVb4tKqsfAw7kSt9qou7bWLQdaPsbR0XxnHZlQkf-pez1a9ar1lSBOFFaTwYN

Targets

    • Target

      umbralstealer.exe

    • Size

      229KB

    • MD5

      83b81dda82a62350b52ee97a12d3163a

    • SHA1

      3e7c9d5eda676771071fa77ce8f357b0c32673fa

    • SHA256

      b8e51135b2e0a124ac1103a9c4a6f2353d289ffe99611d990c291ae356950ecf

    • SHA512

      e0d0d47479b19287dbb731b0025c458623fa17e77d506756a7e90289abf0c04faa5e655bd2f521ead68d3c8530cb4ecaf1cb1c48e1fe2e03759affe8c0c4ca04

    • SSDEEP

      6144:lloZM9fsXtioRkts/cnnK6cMlxDKxX8il927De8NhoREb8e1muoi:noZXtlRk83MlxDKxX8il927De8NhoOJ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks