General

  • Target

    cybersec multitool.exe

  • Size

    631KB

  • Sample

    241128-cq6drsxjhl

  • MD5

    8b2224504b56a273fcb096f266c8946e

  • SHA1

    d25adb8c1e4370e4e5de7e69eead5737404e9401

  • SHA256

    6b5a764726812a78d0f0cfff4921f2c15c47f7cc265cb7dd9f293aa4728a1c19

  • SHA512

    1d3fe9628dd39b4d94fe8e6ed5e58576337a7a94effce38530530c695fb25fbe4e8a3c62efc73d0511a3daa8966afec7d559a50c48483451e68d04cbc9229479

  • SSDEEP

    12288:5oZtL+EP8YOkSt74szYKrd4UBnvmiMdRC:XI8vkSt74szYKrd4UBn+iMdA

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1311512162442674258/KZ7Yf6xtuzDgeDzhbkhFHunjKft3Vjq7gk__oOyCg4FN2mQmI4IlBQeKzeh515-W6ojX

Targets

    • Target

      cybersec multitool.exe

    • Size

      631KB

    • MD5

      8b2224504b56a273fcb096f266c8946e

    • SHA1

      d25adb8c1e4370e4e5de7e69eead5737404e9401

    • SHA256

      6b5a764726812a78d0f0cfff4921f2c15c47f7cc265cb7dd9f293aa4728a1c19

    • SHA512

      1d3fe9628dd39b4d94fe8e6ed5e58576337a7a94effce38530530c695fb25fbe4e8a3c62efc73d0511a3daa8966afec7d559a50c48483451e68d04cbc9229479

    • SSDEEP

      12288:5oZtL+EP8YOkSt74szYKrd4UBnvmiMdRC:XI8vkSt74szYKrd4UBn+iMdA

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks