General

  • Target

    Nursultan Alpha Crac.zip

  • Size

    166KB

  • Sample

    241115-q5d5qaymdr

  • MD5

    a702e86bc5b2414cbd56640dd49ecd7e

  • SHA1

    57667ea34b124f8c864e307d320935a08524e8cb

  • SHA256

    f1893a01dfcf41766265f2f197163382e7237f2571f37cf0fd83aa990942b299

  • SHA512

    7a7b8ca36ce180e549e9ed3502058cb52f3b62eca31f4d14bca0fc4ce5e2444d66c3c14c17ee3842bd7141d10ae9158b53e2ab88ba76e35a0f104fab0b16a1db

  • SSDEEP

    3072:vcgjKXDllnPXeIzO7DR4Qm6iywGI4XygzXlYSGxQjDUjvkZxrb8m9:vlKruIzuq6hwGIK1PYAMm9

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1305215816312295496/rY0Dry8ZlCgHhtUlzGswN815TaT6KbXjX_IAdYGMNd3Mvdmq7PV9Lex48HUyMcaETyeK

Targets

    • Target

      Nursultan Alpha Crack.exe

    • Size

      494KB

    • MD5

      e6884786b4fca76e3752225aa2f24abb

    • SHA1

      a089d0818839ee52bcd0d8156fba1470c2f9ba3c

    • SHA256

      fd0bdd761b727b568e5d9d572aabff62177c4208ce2d1b281d278379b856bf5a

    • SHA512

      e41ea86252a735f8a03625ba79b65a3a790663a03d66f7f4c36ab8a94244944bcf75c6389e448ce962f523120dc8cb2787c2766f12e7e6667276a038209395e6

    • SSDEEP

      12288:doZItlRk83MllBazCg/7IsR0STTKI7AY/rXi7Q:r5r3kazCg/7IsR0STTKI/rXiU

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks