General

  • Target

    1.exe

  • Size

    231KB

  • Sample

    240906-ay3xhaxcjd

  • MD5

    55ede8f26c8c4e66cb0ce6f611d1cda9

  • SHA1

    7afcbd679f67ccebfa2b187a864051c47dcff247

  • SHA256

    85ec91cce58a9d18f5161164fa36f3c32ab4a133e331e30143026692824aae52

  • SHA512

    6943227a873ed601fe2d81da7498b8a4323c525cead8a32ad35c9e51513cf50b99c2d0486e6da3463992db81b0cfdf280829cb4bb59e32c2ad32e1c3cd58a77b

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4wuqmn9GuBV0dP6aPKEb8e1m5Mi:joZtL+EP8wuqmn9GuBV0dP6aPTKF

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1281076930648608779/WTPCLKlUSsVyAb4kF16YFHDUj8d6tGfYo49bnQyv4nB9OiF8PqMnkR_ia-uPDoNoD4ZG

Targets

    • Target

      1.exe

    • Size

      231KB

    • MD5

      55ede8f26c8c4e66cb0ce6f611d1cda9

    • SHA1

      7afcbd679f67ccebfa2b187a864051c47dcff247

    • SHA256

      85ec91cce58a9d18f5161164fa36f3c32ab4a133e331e30143026692824aae52

    • SHA512

      6943227a873ed601fe2d81da7498b8a4323c525cead8a32ad35c9e51513cf50b99c2d0486e6da3463992db81b0cfdf280829cb4bb59e32c2ad32e1c3cd58a77b

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD4wuqmn9GuBV0dP6aPKEb8e1m5Mi:joZtL+EP8wuqmn9GuBV0dP6aPTKF

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks