General

  • Target

    VoiceMini.exe

  • Size

    494KB

  • Sample

    241117-ykakss1rgn

  • MD5

    1b0ce33547b32c1bc6a0576109673f46

  • SHA1

    bbdd7efb0ce53cac7bc195e1e48ae6b5fbdec3ea

  • SHA256

    9a11a5e65506d504a4c0548c7b4b64660c17df9814fe57c9a7499cae995c1226

  • SHA512

    effa302d783a745f8479279ef39316092425d5294b57fffb9d6abb635c54a6b279bde64938302182f882bc157e05112fb799c27e6a42c9846ac13c162c1f1a58

  • SSDEEP

    6144:3loZM+rIkd8g+EtXHkv/iD4Rern+8D/07VA+Pv+Arb8e1mQAKiXu/S0uy:VoZtL+EP8Rern+8D/07VA+Pv+Sqv

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1306746597190668348/ewKXdYwVMCycnpr8ensi7kegTU_jqsV7jexnVi32VYczuTUSqGULTiJuB63x06lcpI_V

Targets

    • Target

      VoiceMini.exe

    • Size

      494KB

    • MD5

      1b0ce33547b32c1bc6a0576109673f46

    • SHA1

      bbdd7efb0ce53cac7bc195e1e48ae6b5fbdec3ea

    • SHA256

      9a11a5e65506d504a4c0548c7b4b64660c17df9814fe57c9a7499cae995c1226

    • SHA512

      effa302d783a745f8479279ef39316092425d5294b57fffb9d6abb635c54a6b279bde64938302182f882bc157e05112fb799c27e6a42c9846ac13c162c1f1a58

    • SSDEEP

      6144:3loZM+rIkd8g+EtXHkv/iD4Rern+8D/07VA+Pv+Arb8e1mQAKiXu/S0uy:VoZtL+EP8Rern+8D/07VA+Pv+Sqv

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks