General

  • Target

    CS2Cheat (123).zip

  • Size

    5.7MB

  • Sample

    241028-hq5p5atdmr

  • MD5

    148098afaadc07fd0b8b0d14d9b5d9d4

  • SHA1

    7eaca8c4c1e35da1357c547145346037eb037062

  • SHA256

    a9b604c34a849e743d65ee178e52090824b6220b806db53c50df8901e1fc7658

  • SHA512

    4c491680a6a39324187e8d5f6542ecd36ec00ac0727361f10e6008f90fd2ed9b8af5d11cd289f1004b7cc216e74b01374feb49c61e184378084a6ed6fe4678b5

  • SSDEEP

    98304:4ljVhV4b0V4wMGWscapVlwIinJE2rUPrwZDY9B2BCVZWG25kvNdBTvL10mVqDPw:YhVTFppV8JdUcZM9B2B9EVdBbL1HqDo

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1299080733079375894/hrEkdZRiNfD_2CydV4FCra9Yr1O879zBhe-K5U4ievQAChYclaabDINuCDCfyjlfFnOg

Targets

    • Target

      CS2Cheat.exe

    • Size

      5.7MB

    • MD5

      920f3ec2a3fe3557e067f5cef16235f8

    • SHA1

      30a82dc93b0d235d618f44a94bcd092791821912

    • SHA256

      bd0976acd920ba7eedaad30f8834062856da10b46bf6c8ad9312fb3fdacddb8e

    • SHA512

      0fc2e8ee35c4e56efc1bfded2803474881b3b29d4b01c80a600aff36a002a63108fa6e200100e0e1866ce58fd3040188949f00968802430d4e9f9e5c1eced681

    • SSDEEP

      98304:SBfkDxFCuc+TThUj1lmFHKDWKkcdwYCQ0HGrDfEWOGa5YZUI692IWOgCheFezwjz:SRkzbc+vOjzpW27CzED8WiAV6Il8eZjz

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks