General

  • Target

    2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fedN

  • Size

    7KB

  • Sample

    240929-2nwtzstfkl

  • MD5

    a55a5ee391fa38f5f2b7a8c13da0d7e0

  • SHA1

    09411fe1464fb2e6586736c3292cb06e60e482aa

  • SHA256

    2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fed

  • SHA512

    f82eba269c0e5fa276fd46e110ed7d76f15b53dcc410c4c7bb329393cd0a3b7d40bb41827cd1075778b0075f0fcb366b7e5b62a69e2c3bc3dc3c50ee2252b242

  • SSDEEP

    96:uy13k1c0tjvPhLJLMTItVVlkNHRt+sCiEVUY/e2PK0/vzKzNt:J3k1c0tLPh9LNrv83+sSVUYH/vzs

Malware Config

Targets

    • Target

      2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fedN

    • Size

      7KB

    • MD5

      a55a5ee391fa38f5f2b7a8c13da0d7e0

    • SHA1

      09411fe1464fb2e6586736c3292cb06e60e482aa

    • SHA256

      2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fed

    • SHA512

      f82eba269c0e5fa276fd46e110ed7d76f15b53dcc410c4c7bb329393cd0a3b7d40bb41827cd1075778b0075f0fcb366b7e5b62a69e2c3bc3dc3c50ee2252b242

    • SSDEEP

      96:uy13k1c0tjvPhLJLMTItVVlkNHRt+sCiEVUY/e2PK0/vzKzNt:J3k1c0tLPh9LNrv83+sSVUYH/vzs

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks