General

  • Target

    733c9f0a21cb6a4386496fa43fd1b2255e07adec398ea5a296523ffbacf83277N

  • Size

    227KB

  • Sample

    240919-dypawsyckf

  • MD5

    a9c85ce4900aa26ca173db8d18423290

  • SHA1

    913ff9008ac363798994a5db576357623c3abb6b

  • SHA256

    733c9f0a21cb6a4386496fa43fd1b2255e07adec398ea5a296523ffbacf83277

  • SHA512

    2d2eb846ea057068ce639c39494adea686bbc76b7cce0eb4c0ea7396f0048bb3fafe3d9b24421d906d321576b8f3ac6517d4fa69886fecf958690b8fdf844cc9

  • SSDEEP

    6144:eloZM+rIkd8g+EtXHkv/iD4mI1UOsTPkhFQu//O6vb8e1m0Li:IoZtL+EP8mI1UOsTPkhFQu//OAg

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1282055476837879861/29zT8D_I9Jr87Dskp8KAlHzBq4n7Wm1c9jw1R8LwI4OONQmvMGmGbeoEjhxhZcNokYu7

Targets

    • Target

      733c9f0a21cb6a4386496fa43fd1b2255e07adec398ea5a296523ffbacf83277N

    • Size

      227KB

    • MD5

      a9c85ce4900aa26ca173db8d18423290

    • SHA1

      913ff9008ac363798994a5db576357623c3abb6b

    • SHA256

      733c9f0a21cb6a4386496fa43fd1b2255e07adec398ea5a296523ffbacf83277

    • SHA512

      2d2eb846ea057068ce639c39494adea686bbc76b7cce0eb4c0ea7396f0048bb3fafe3d9b24421d906d321576b8f3ac6517d4fa69886fecf958690b8fdf844cc9

    • SSDEEP

      6144:eloZM+rIkd8g+EtXHkv/iD4mI1UOsTPkhFQu//O6vb8e1m0Li:IoZtL+EP8mI1UOsTPkhFQu//OAg

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks