General

  • Target

    Eval.gg.exe

  • Size

    231KB

  • Sample

    240911-3xeshazfpl

  • MD5

    28aa75839a6f5f64e82139f18dd6331b

  • SHA1

    511fd8d498f9c4e333aa7397ed0f8e26ac7ba159

  • SHA256

    c4943ea4fbfe0cb85961446f99020cd60789b1557f73adb5b5f66b25e936ce69

  • SHA512

    2259e8c91ef2e1a5cd56c77ebe9f8fa6a2071671d9c5447a45e1381abb8498745a63b781510cba1d5de258404a601b5a2742bb4cb6cf3cc69a3c5453cb470564

  • SSDEEP

    6144:hloZM+rIkd8g+EtXHkv/iD4tx/GEKtFuxr20VJgBlb8e1m/3i:ToZtL+EP8tx/GEKtFuxr20VJgzYS

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1283560097590542368/p3Bpyu3RP4hOB9HE7uZFW3RadScsxcJNQOC60HNfQx2Rpx_4r4atEvIKpOvtUIrJsDaW

Targets

    • Target

      Eval.gg.exe

    • Size

      231KB

    • MD5

      28aa75839a6f5f64e82139f18dd6331b

    • SHA1

      511fd8d498f9c4e333aa7397ed0f8e26ac7ba159

    • SHA256

      c4943ea4fbfe0cb85961446f99020cd60789b1557f73adb5b5f66b25e936ce69

    • SHA512

      2259e8c91ef2e1a5cd56c77ebe9f8fa6a2071671d9c5447a45e1381abb8498745a63b781510cba1d5de258404a601b5a2742bb4cb6cf3cc69a3c5453cb470564

    • SSDEEP

      6144:hloZM+rIkd8g+EtXHkv/iD4tx/GEKtFuxr20VJgBlb8e1m/3i:ToZtL+EP8tx/GEKtFuxr20VJgzYS

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks