General

  • Target

    test.exe

  • Size

    360KB

  • Sample

    240915-as792awarq

  • MD5

    d16b4139ed4406bce80daf7f64ea7f76

  • SHA1

    d1380cc067fe320dc16e43ac31208e2ce0d7fd5c

  • SHA256

    44806f5e8beab048f45916e5723a475bd20f2684929ec4cc92b1096168a4e32f

  • SHA512

    cee8211366528d5c5bb821a2c6c53f445b43659e43734ce9cb16a368dcd2d28d5e909c5e489482625ef73daa7b387d939829089c69961b3291a7e741b29a0fa6

  • SSDEEP

    6144:1loZM+rIkd8g+EtXHkv/iD4p9d0mkrHMp9YW3X2B0b8e1mLieq:XoZtL+EP8p9d0mkrHMp9YW3X2iVeq

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1284669235687198743/YM3nJjFx4CJ-kn46QCwSQbLnGTqePDB1Xn00-cOyln-4FF_bnfPT7KWZpGAk6b6xR8CE

Targets

    • Target

      test.exe

    • Size

      360KB

    • MD5

      d16b4139ed4406bce80daf7f64ea7f76

    • SHA1

      d1380cc067fe320dc16e43ac31208e2ce0d7fd5c

    • SHA256

      44806f5e8beab048f45916e5723a475bd20f2684929ec4cc92b1096168a4e32f

    • SHA512

      cee8211366528d5c5bb821a2c6c53f445b43659e43734ce9cb16a368dcd2d28d5e909c5e489482625ef73daa7b387d939829089c69961b3291a7e741b29a0fa6

    • SSDEEP

      6144:1loZM+rIkd8g+EtXHkv/iD4p9d0mkrHMp9YW3X2B0b8e1mLieq:XoZtL+EP8p9d0mkrHMp9YW3X2iVeq

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks