General

  • Target

    upx.exe

  • Size

    232KB

  • Sample

    240907-wh9wrsyerb

  • MD5

    4f64d4d9289bdfcf55fe7a4de0e07f27

  • SHA1

    9981fb1876461216a376558f41fa67ba4bc64aba

  • SHA256

    8b8e99eb8ab351e0c1d45aac62784d4e941eb4816ec00736704c564c670555da

  • SHA512

    78a60559439a7b0d16fcb926c8ba16531cbaf34fdc47f0abdc236921e6f196fe829118cd8ee252c3699486a849a5ffcb2744f3ef802ed8f39369388f1b9c326b

  • SSDEEP

    6144:9loZM+rIkd8g+EtXHkv/iD43jn0BPUon4WvRsY90vb8e1mnxFi:foZtL+EP83jn0BPUon4WvRsY9uYm

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1281530185321156663/D5zfp8fwZ0airaU9qx4oZzemQX8eWe_A9whpSCBsH5minNFS7aRp31EvssVYVENCN25Q

Targets

    • Target

      upx.exe

    • Size

      232KB

    • MD5

      4f64d4d9289bdfcf55fe7a4de0e07f27

    • SHA1

      9981fb1876461216a376558f41fa67ba4bc64aba

    • SHA256

      8b8e99eb8ab351e0c1d45aac62784d4e941eb4816ec00736704c564c670555da

    • SHA512

      78a60559439a7b0d16fcb926c8ba16531cbaf34fdc47f0abdc236921e6f196fe829118cd8ee252c3699486a849a5ffcb2744f3ef802ed8f39369388f1b9c326b

    • SSDEEP

      6144:9loZM+rIkd8g+EtXHkv/iD43jn0BPUon4WvRsY90vb8e1mnxFi:foZtL+EP83jn0BPUon4WvRsY9uYm

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks