General

  • Target

    Client.exe

  • Size

    440KB

  • Sample

    241126-z5vbdawrbl

  • MD5

    6527754a84c08c132797ac0e41232027

  • SHA1

    f42f9df429a4fe20f02039d5628bbb5f8c334265

  • SHA256

    b0a58d3f76d8ec2462e59c1ca89b6131ad81a7fabc43b5e7d3bd883311035d8a

  • SHA512

    ebcba42e29d8aba555479ebf6841bc44c9f5542edf51728d41bfa65fadb847c2e849d64a2dbe5634bcbafa884d04027b0d29999f7d640d7045a05dfb8d610480

  • SSDEEP

    6144:CuuPnduxK8e6VlWT8b9LBlTsjp6PvZhb5z9YivZQw:5uPnkPVle8lWpgz1ZQ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1308428735950622800/sWvRLs-dtmRQlMNZW9kIl-o0w8Hh4Hm0B7f93c-PShVCWNK3T9twd6vncAOynKZpzZfx

Targets

    • Target

      Client.exe

    • Size

      440KB

    • MD5

      6527754a84c08c132797ac0e41232027

    • SHA1

      f42f9df429a4fe20f02039d5628bbb5f8c334265

    • SHA256

      b0a58d3f76d8ec2462e59c1ca89b6131ad81a7fabc43b5e7d3bd883311035d8a

    • SHA512

      ebcba42e29d8aba555479ebf6841bc44c9f5542edf51728d41bfa65fadb847c2e849d64a2dbe5634bcbafa884d04027b0d29999f7d640d7045a05dfb8d610480

    • SSDEEP

      6144:CuuPnduxK8e6VlWT8b9LBlTsjp6PvZhb5z9YivZQw:5uPnkPVle8lWpgz1ZQ

    • Detect Umbral payload

    • Modifies WinLogon for persistence

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks