General

  • Target

    osintbeta.exe

  • Size

    631KB

  • Sample

    241130-hzha7axqft

  • MD5

    651f9b8d2e6d57a5ad192c4f9e6bc5fe

  • SHA1

    351d05c661abc76b335cb99b620a8a81367e41de

  • SHA256

    10a0c83bc6522b597850d3871616715533031cba948807d3831b5a239d5d7f9b

  • SHA512

    9573a78740c3ada200d282c34ffb07bc4f5549a7ddd5dcdf5f0070aba5be5cc0bdc0ab1bc54bd0283a43bc34febc5e0c7fb1ade6bb5173e598890be76445256b

  • SSDEEP

    12288:hoZtL+EP8l1xMw2xpamPyAxVkghNiMdRC:fI8rxMw2xpamPyAxVkgriMdA

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1312288623672037376/2GH04B8YXsC6XReHUK0ahKf5rxv-juGkGHKoDn44G9e1LgY6b0deNb9KwidwVkVbfmse

Targets

    • Target

      osintbeta.exe

    • Size

      631KB

    • MD5

      651f9b8d2e6d57a5ad192c4f9e6bc5fe

    • SHA1

      351d05c661abc76b335cb99b620a8a81367e41de

    • SHA256

      10a0c83bc6522b597850d3871616715533031cba948807d3831b5a239d5d7f9b

    • SHA512

      9573a78740c3ada200d282c34ffb07bc4f5549a7ddd5dcdf5f0070aba5be5cc0bdc0ab1bc54bd0283a43bc34febc5e0c7fb1ade6bb5173e598890be76445256b

    • SSDEEP

      12288:hoZtL+EP8l1xMw2xpamPyAxVkghNiMdRC:fI8rxMw2xpamPyAxVkgriMdA

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks