General

  • Target

    svchost.exe

  • Size

    234KB

  • Sample

    240918-sethtsxcmd

  • MD5

    4de282f3a3d77c0b217fa45c09454d22

  • SHA1

    bdf07d339f21217ae5acfcce83bcc04ac1037134

  • SHA256

    e6d228a2a4610cb3d21b4cc965223f5f4c98e40263c71d0307e6dc4a693512ec

  • SHA512

    2b58af8a8b1ed2328c100dc9f7665e26c08c3b586079f736255003f3a1a503d6ba97a4040168c5da4d6998d0d2ed81735b74d73958e9baeef361d97559c701fa

  • SSDEEP

    6144:1rQHIw0YRt+1SHkekkngPBJW8e1mhNax:1QP+2nfC0x

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1285972781925798132/nBZqbxL73TFbSYajVgbmW6KAjmyusRbWfByPMvZHMnjHAVPOWVCXCxCsfk91nafH1Gby

Targets

    • Target

      svchost.exe

    • Size

      234KB

    • MD5

      4de282f3a3d77c0b217fa45c09454d22

    • SHA1

      bdf07d339f21217ae5acfcce83bcc04ac1037134

    • SHA256

      e6d228a2a4610cb3d21b4cc965223f5f4c98e40263c71d0307e6dc4a693512ec

    • SHA512

      2b58af8a8b1ed2328c100dc9f7665e26c08c3b586079f736255003f3a1a503d6ba97a4040168c5da4d6998d0d2ed81735b74d73958e9baeef361d97559c701fa

    • SSDEEP

      6144:1rQHIw0YRt+1SHkekkngPBJW8e1mhNax:1QP+2nfC0x

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks