General

  • Target

    Nitro Tools.rar

  • Size

    82KB

  • Sample

    240905-sv9jzsthrd

  • MD5

    7460868214131fe4bc500c47c5f4b2fd

  • SHA1

    b3e620e61b573737e26eafc0b42588227802722d

  • SHA256

    4adaffe46ccae1425c54b81f87fcb56b7f66760b5d5f0ae3328e72c934bbb3c8

  • SHA512

    3c2f5f4af969997b8939222daa16010435e97e57da110b64a61e13bc3d8d32d54bed31478bc0fbec8479c143b1d4234b43c9d8814c473b5e29f95c690cccc94e

  • SSDEEP

    1536:WQ5EgwfR8sOVflllq9yZvBX1xKjFogPrU+b2zajL:WQ5NwmHVflllq9yHFxKjnTU42z+

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1281243540256591944/Hvm3cR-qlME8rmsZEzAd9Bcccgxn-2QEXALCjrbq5rrzjv2Aw7afNK5Xd_8l5UgqnCuL

Targets

    • Target

      Nitro Tools.exe

    • Size

      231KB

    • MD5

      eb9bfe2cafae0e84d30f9e214ec4a6aa

    • SHA1

      fabd92cb405e06b720a88d0077b124fb97577208

    • SHA256

      e88819618a14114c00385b9729bd83567ab21a5547baa8923477bd2c54434369

    • SHA512

      8358eddbb14c88a5ff8859a1c0339f7d0380c8a91510b5daa0e6a3a6dcd15b3967496caef46d10e5f1ba6e7d60c65077022815fa16fc7f0fc542b17007e2a0fa

    • SSDEEP

      6144:RloZM3fsXtioRkts/cnnK6cMl1l0W6YXzQgp8aLLyJcS8e1mKLi:joZ1tlRk83Ml1l0W6YXzQgp8aLLy5rG

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks