General

  • Target

    explorer (1)

  • Size

    1.3MB

  • Sample

    240916-wzbejasfjb

  • MD5

    575b9fa5e916d6e0fe48003127c0e7b3

  • SHA1

    ea732f7fcd8e0f20f8c66c8a0ab20880851c2f6e

  • SHA256

    e45dc08a9c9c96afdcbb33dc108417df2ec52ccb0bb1f776bc83770c70ef4739

  • SHA512

    3f337262446aad13ad05589f170149b916692ef4dffd1f005029dcbd01a6e703442d19678641501d466df9f3e264ed946ee39290141fc470ba545725d8fd3f14

  • SSDEEP

    24576:StvMlasKkTqxNx5V27DeEhP959IY9noqx78BXO/1byJRT:0gep23b9IUoqxT/1byJ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1285146489047220246/6vaVojXPUSotwltFctwpYZfgInpOOjizCsR1Uwtcyb0_147wBk4FcBkKK4kpNTvlzaom

Targets

    • Target

      explorer (1)

    • Size

      1.3MB

    • MD5

      575b9fa5e916d6e0fe48003127c0e7b3

    • SHA1

      ea732f7fcd8e0f20f8c66c8a0ab20880851c2f6e

    • SHA256

      e45dc08a9c9c96afdcbb33dc108417df2ec52ccb0bb1f776bc83770c70ef4739

    • SHA512

      3f337262446aad13ad05589f170149b916692ef4dffd1f005029dcbd01a6e703442d19678641501d466df9f3e264ed946ee39290141fc470ba545725d8fd3f14

    • SSDEEP

      24576:StvMlasKkTqxNx5V27DeEhP959IY9noqx78BXO/1byJRT:0gep23b9IUoqxT/1byJ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks