General

  • Target

    visa generator.exe

  • Size

    254KB

  • Sample

    241010-tcn11ayfqr

  • MD5

    711225a87b2c2069b3f29d97856b6462

  • SHA1

    cb2a915c50090e03ea93ac92c7957a789ffda322

  • SHA256

    860eed7c10b5d0fff8a8b88cfd7de7cdd74d571bad64833af199d827af4e377d

  • SHA512

    8da2cd7faa1676986bf8b103738dcf82079f29f313cbe5da61620b20232e5aa161893229ee9511827df68a500733f34dcb737d681e92ac5e5bb7cfcd1faed82a

  • SSDEEP

    6144:K4oZo0eVHPtHgTIAaZgCwDx7axHU0unC28ejI8n7:xoZWHPvWCwjXCsIq

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1289653062121685093/c26zRFNhesf1AIN0ZAe787Ex1TnQKaGtY_KNXOuxi3k38YF1pZcXhj93ArG7bVHDT-6e

Targets

    • Target

      visa generator.exe

    • Size

      254KB

    • MD5

      711225a87b2c2069b3f29d97856b6462

    • SHA1

      cb2a915c50090e03ea93ac92c7957a789ffda322

    • SHA256

      860eed7c10b5d0fff8a8b88cfd7de7cdd74d571bad64833af199d827af4e377d

    • SHA512

      8da2cd7faa1676986bf8b103738dcf82079f29f313cbe5da61620b20232e5aa161893229ee9511827df68a500733f34dcb737d681e92ac5e5bb7cfcd1faed82a

    • SSDEEP

      6144:K4oZo0eVHPtHgTIAaZgCwDx7axHU0unC28ejI8n7:xoZWHPvWCwjXCsIq

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks