General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    241027-1dfjksshld

  • MD5

    f2b455f6e472b641d1ccc3f9c01cf429

  • SHA1

    e31c726c4d8a5a786940cb513eb90a07f2a81ca8

  • SHA256

    e899e164d7941ef537bd9e1b6ec3cce4853836cc0893df4ab18e291bba93099a

  • SHA512

    460b49463f834562d5ecf567a992c2ff7c282eeb9d9524a2db809143561c35b6cf8a86fc474e15c6366196a5111656536bcb97c57b7a2d1320427b467cf66c52

  • SSDEEP

    6144:FloZMKrIkd8g+EtXHkv/iD4BtDSdLocDxabtIExCgb8e1mk2i:HoZJL+EP8BtDSdLocDxabtIExLX7

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1292124140064608337/kC3TU34BcNXonIUE9I3g7boAXRaXWicDnCBjx6ez4OuvYOZAYUVkQfISJI8n5-ZpJnpL

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      f2b455f6e472b641d1ccc3f9c01cf429

    • SHA1

      e31c726c4d8a5a786940cb513eb90a07f2a81ca8

    • SHA256

      e899e164d7941ef537bd9e1b6ec3cce4853836cc0893df4ab18e291bba93099a

    • SHA512

      460b49463f834562d5ecf567a992c2ff7c282eeb9d9524a2db809143561c35b6cf8a86fc474e15c6366196a5111656536bcb97c57b7a2d1320427b467cf66c52

    • SSDEEP

      6144:FloZMKrIkd8g+EtXHkv/iD4BtDSdLocDxabtIExCgb8e1mk2i:HoZJL+EP8BtDSdLocDxabtIExLX7

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks