General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
241110-t167gstndl
-
MD5
468453ade106242c46c6ebc95df5e233
-
SHA1
901875b848f10048764fe07c0c6ac7db7c33f551
-
SHA256
2a92c314a04c06f608c96a0736b3ea76179085295b700019c9db0de2085e9d7d
-
SHA512
4d351c895e3456ab926ff13c03f779f4804f8011085e311dcd16825f87ec6290b37d52a555e187ab748da40998301c8258a8c2c74d74640c795574590fa374eb
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4hEnG1DA0r2SjVg8Zk5b8e1mhxi:noZOL+EP8hEnG1DA0r2SjVg8Zw8o
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1305189485495193700/R0P9VUM8phPeR6eYWoqnLbAbuvyNJyecQgNsqBxny_j-i9H3i3B5Wdt6c57GJxVKvA5y
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
468453ade106242c46c6ebc95df5e233
-
SHA1
901875b848f10048764fe07c0c6ac7db7c33f551
-
SHA256
2a92c314a04c06f608c96a0736b3ea76179085295b700019c9db0de2085e9d7d
-
SHA512
4d351c895e3456ab926ff13c03f779f4804f8011085e311dcd16825f87ec6290b37d52a555e187ab748da40998301c8258a8c2c74d74640c795574590fa374eb
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4hEnG1DA0r2SjVg8Zk5b8e1mhxi:noZOL+EP8hEnG1DA0r2SjVg8Zw8o
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1