General

  • Target

    WindowstDriverAutoUpdater_X64.exe

  • Size

    2.5MB

  • Sample

    241030-jz1yzaxrdx

  • MD5

    6f4f8578849ae9ac04f1038f12bc6ba5

  • SHA1

    abac0aa5afca58e47d26139ebb3b50a64b62890c

  • SHA256

    01e0a6ee3525d712d3d56b708914bbe5910cc2cdc3970f82d4afbac413f6142e

  • SHA512

    9bc144713f3179cc3fbcf7531d54d77c714449b5dad1e7c9ab069a5fc14a38e360cc3c93b70018873c2da0221ddad6af3caebb8d1905e322a40d3c9693e1d25e

  • SSDEEP

    49152:gdyk9hBIBRCpIfYU697Dmz9R6YZBbxPFii8QrPL4mgekYllV:gb9hBIBopzUsDcnBtFii8QT0mxlb

Malware Config

Targets

    • Target

      WindowstDriverAutoUpdater_X64.exe

    • Size

      2.5MB

    • MD5

      6f4f8578849ae9ac04f1038f12bc6ba5

    • SHA1

      abac0aa5afca58e47d26139ebb3b50a64b62890c

    • SHA256

      01e0a6ee3525d712d3d56b708914bbe5910cc2cdc3970f82d4afbac413f6142e

    • SHA512

      9bc144713f3179cc3fbcf7531d54d77c714449b5dad1e7c9ab069a5fc14a38e360cc3c93b70018873c2da0221ddad6af3caebb8d1905e322a40d3c9693e1d25e

    • SSDEEP

      49152:gdyk9hBIBRCpIfYU697Dmz9R6YZBbxPFii8QrPL4mgekYllV:gb9hBIBopzUsDcnBtFii8QT0mxlb

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks