General

  • Target

    v-rise.exe

  • Size

    231KB

  • Sample

    241120-1mcjaavcqj

  • MD5

    96733f1c7335e4feb3df5510e7ff3381

  • SHA1

    13610a36de1096cbd27029cf045db560c0a11a00

  • SHA256

    2beabdeb546ede6ad3e196c42c64d2a6733bc81de2574398b3c2b46668aecf1c

  • SHA512

    590d1d2d21154c3e08edae598b702849eb3f93d5c08cf772a1215595f269c4123599ee010ba5a257bdc0a07455e68db92a49542903acf791fedff1d623b6eecb

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD48tzFw2xpaNPyAxVkYRb8e1mjXi:joZtL+EP88tzFw2xpaNPyAxVk0Uy

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1306714080786124932/6sEiVvrOdbnLDQsYjvdDac-Of6XLBKvSR6lSPhBDMe5gbr0HBrbFzjy0XVETwUYMFaCY

Targets

    • Target

      v-rise.exe

    • Size

      231KB

    • MD5

      96733f1c7335e4feb3df5510e7ff3381

    • SHA1

      13610a36de1096cbd27029cf045db560c0a11a00

    • SHA256

      2beabdeb546ede6ad3e196c42c64d2a6733bc81de2574398b3c2b46668aecf1c

    • SHA512

      590d1d2d21154c3e08edae598b702849eb3f93d5c08cf772a1215595f269c4123599ee010ba5a257bdc0a07455e68db92a49542903acf791fedff1d623b6eecb

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD48tzFw2xpaNPyAxVkYRb8e1mjXi:joZtL+EP88tzFw2xpaNPyAxVk0Uy

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks