General

  • Target

    8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874

  • Size

    229KB

  • Sample

    240920-z8lhmsyfrk

  • MD5

    25a2fec95cda41fd3c61d60c94ff3364

  • SHA1

    beaf7f2cac9263de452edd2acf988c7ee80a3b1b

  • SHA256

    8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874

  • SHA512

    30da5918a3afd72ec6f5ff5fb70f4d7c0a4d424f12b1fa1be9453bb8ee8df0cdc89aa05d6202d8392032f2f6e47b2c43ea36e024b0def49ed829bfe10ff2d830

  • SSDEEP

    6144:9loZMjNaK9/gMntXP03fCFZ4HZMs1tGRPAA/NotgKv8eFlLBT:foZwd5n734HZMs1tGRPAA/NpWlZ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1285678240769245204/Dq6zV8vBVQwMR8PmcuFAplSv7V5Q4av4gvUflUzlpEaaJSOpw9baWNsnjhiJwoEYkK78

Targets

    • Target

      8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874

    • Size

      229KB

    • MD5

      25a2fec95cda41fd3c61d60c94ff3364

    • SHA1

      beaf7f2cac9263de452edd2acf988c7ee80a3b1b

    • SHA256

      8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874

    • SHA512

      30da5918a3afd72ec6f5ff5fb70f4d7c0a4d424f12b1fa1be9453bb8ee8df0cdc89aa05d6202d8392032f2f6e47b2c43ea36e024b0def49ed829bfe10ff2d830

    • SSDEEP

      6144:9loZMjNaK9/gMntXP03fCFZ4HZMs1tGRPAA/NotgKv8eFlLBT:foZwd5n734HZMs1tGRPAA/NpWlZ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks