Resubmissions

30-11-2024 07:04

241130-hv4cvsxqax 10

30-11-2024 04:22

241130-ezgg4swqbp 10

General

  • Target

    osintool.exe

  • Size

    632KB

  • Sample

    241130-ezgg4swqbp

  • MD5

    20181934a508ec23e7c2223be3c58e3b

  • SHA1

    a29f3f89d10ff05f4589466bc11a2fd45016e0e5

  • SHA256

    28fda1422979b63fd9b489a76cf5e43e68aa095eae547e96f050550b37208cab

  • SHA512

    8f0a1dfa0e627d7779754cd045dc9dcaedbcb332870962706a9bbcc69d9383c8166c940844047ba4a85e3209f5bf0d284f7e84e67345347f8f2c21d93ef043f7

  • SSDEEP

    12288:hoZtL+EP8shN9rI8jS67NokRq8zNiMdRC:fI8iN9rI8jS67NokRlBiMdA

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1312264598925344790/QIlCbExze1iw_e1zkeZ792QOLaj8nGWIjrO_7fuXi-iXKjKnWrqwQcXcL_p5RK0UxvMv

Targets

    • Target

      osintool.exe

    • Size

      632KB

    • MD5

      20181934a508ec23e7c2223be3c58e3b

    • SHA1

      a29f3f89d10ff05f4589466bc11a2fd45016e0e5

    • SHA256

      28fda1422979b63fd9b489a76cf5e43e68aa095eae547e96f050550b37208cab

    • SHA512

      8f0a1dfa0e627d7779754cd045dc9dcaedbcb332870962706a9bbcc69d9383c8166c940844047ba4a85e3209f5bf0d284f7e84e67345347f8f2c21d93ef043f7

    • SSDEEP

      12288:hoZtL+EP8shN9rI8jS67NokRq8zNiMdRC:fI8iN9rI8jS67NokRlBiMdA

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks