General

  • Target

    octosint.exe

  • Size

    628KB

  • Sample

    241130-kr54dstpfl

  • MD5

    b4effaa19b06eb4a92b66b0ff2702c91

  • SHA1

    703aa3cec640517f6e51033c27bef4bbeb9afe9b

  • SHA256

    2464cc00fd3a0e7b5fd2e171e967b2ef65fde94bff68dda2dab12e2b9dce108d

  • SHA512

    d7e379b2148dc4697e7cd1529ef88bc5386f66df992afcb4423b4f24a7402b18531aee341c3dc22fe97d37583d7856a13cd1cdbeb341b042f0b547f485e09cd8

  • SSDEEP

    12288:2oZtL+EP8GwI8EKtFu9r20VJg2VFRiMdRC:qI8fI8EKtFu9r20VJg2hiMdA

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1312316482243395674/CDkI6IYU75yTK5pEycJanJbjsbPzw6RgBf66q4IBGfhFOO-3MKhxAx0JU_T7bQvERqBt

Targets

    • Target

      octosint.exe

    • Size

      628KB

    • MD5

      b4effaa19b06eb4a92b66b0ff2702c91

    • SHA1

      703aa3cec640517f6e51033c27bef4bbeb9afe9b

    • SHA256

      2464cc00fd3a0e7b5fd2e171e967b2ef65fde94bff68dda2dab12e2b9dce108d

    • SHA512

      d7e379b2148dc4697e7cd1529ef88bc5386f66df992afcb4423b4f24a7402b18531aee341c3dc22fe97d37583d7856a13cd1cdbeb341b042f0b547f485e09cd8

    • SSDEEP

      12288:2oZtL+EP8GwI8EKtFu9r20VJg2VFRiMdRC:qI8fI8EKtFu9r20VJg2hiMdA

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks