General

  • Target

    f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a

  • Size

    6.6MB

  • Sample

    240904-m7ex9azfkd

  • MD5

    ddb357ac119ef185255a40c89c7f4036

  • SHA1

    75bfbe9ff027e7fa1b238171106c8fcdac57961d

  • SHA256

    f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a

  • SHA512

    8338ed0f88b27ca8db7c2eb563f9173dc8b326de72cfedb99dc6c600658fbbbb817db75dc79a4fc509f58b236fe61d2ed7c54ce1dd173dcb53c8143ab19ab617

  • SSDEEP

    196608:c3/TNvcXXG6dW0scvNrkSTgB3/RVpXDSJ2cg:gpvcXXGJjclrk53fZSJ2cg

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1252680582354440374/YGnLESbYL-e0ySkeD-oZgw7qzQ6zGILUAto-79q0yWCLmXmZafvQ_AzE_o77RbZbKplc

Targets

    • Target

      f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a

    • Size

      6.6MB

    • MD5

      ddb357ac119ef185255a40c89c7f4036

    • SHA1

      75bfbe9ff027e7fa1b238171106c8fcdac57961d

    • SHA256

      f437564b0cbad3ff7584c5a2efc4cd446a4183121c81ae41a5c6d52cba754c5a

    • SHA512

      8338ed0f88b27ca8db7c2eb563f9173dc8b326de72cfedb99dc6c600658fbbbb817db75dc79a4fc509f58b236fe61d2ed7c54ce1dd173dcb53c8143ab19ab617

    • SSDEEP

      196608:c3/TNvcXXG6dW0scvNrkSTgB3/RVpXDSJ2cg:gpvcXXGJjclrk53fZSJ2cg

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks