General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    241110-t167gstndl

  • MD5

    468453ade106242c46c6ebc95df5e233

  • SHA1

    901875b848f10048764fe07c0c6ac7db7c33f551

  • SHA256

    2a92c314a04c06f608c96a0736b3ea76179085295b700019c9db0de2085e9d7d

  • SHA512

    4d351c895e3456ab926ff13c03f779f4804f8011085e311dcd16825f87ec6290b37d52a555e187ab748da40998301c8258a8c2c74d74640c795574590fa374eb

  • SSDEEP

    6144:lloZM9rIkd8g+EtXHkv/iD4hEnG1DA0r2SjVg8Zk5b8e1mhxi:noZOL+EP8hEnG1DA0r2SjVg8Zw8o

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1305189485495193700/R0P9VUM8phPeR6eYWoqnLbAbuvyNJyecQgNsqBxny_j-i9H3i3B5Wdt6c57GJxVKvA5y

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      468453ade106242c46c6ebc95df5e233

    • SHA1

      901875b848f10048764fe07c0c6ac7db7c33f551

    • SHA256

      2a92c314a04c06f608c96a0736b3ea76179085295b700019c9db0de2085e9d7d

    • SHA512

      4d351c895e3456ab926ff13c03f779f4804f8011085e311dcd16825f87ec6290b37d52a555e187ab748da40998301c8258a8c2c74d74640c795574590fa374eb

    • SSDEEP

      6144:lloZM9rIkd8g+EtXHkv/iD4hEnG1DA0r2SjVg8Zk5b8e1mhxi:noZOL+EP8hEnG1DA0r2SjVg8Zw8o

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks