General

  • Target

    octosint.exe

  • Size

    631KB

  • Sample

    241130-lnxhhsvmgj

  • MD5

    3fbddef1a1957c47cc788a7ea3be9bf1

  • SHA1

    5d68695893be73ad26a1b6115ac38a3e72e11cbf

  • SHA256

    f6978810fc08e07982be2acda6f8692bca7011119e15088fcb2ab006de8dece7

  • SHA512

    76cb0b768c15464ae4dc41d90909a1c740de8e2b3f7b8d37f255068e5a0bd0c6d666e68fcfec47f6cca268de5cf24bc2a85800fb3fe3244fe25b60b8f17c5e54

  • SSDEEP

    12288:5oZtL+EP8gGVK9rI8j967NokRRC9iMdRC:XI8LVK9rI8j967NokRRsiMdA

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1312351295071322142/KvqTDknVHFVZzAuuZpGugxnURuyFuocCHU5Ju80VDkuodo7V_2vvqkBAObQfbAMgULRR

Targets

    • Target

      octosint.exe

    • Size

      631KB

    • MD5

      3fbddef1a1957c47cc788a7ea3be9bf1

    • SHA1

      5d68695893be73ad26a1b6115ac38a3e72e11cbf

    • SHA256

      f6978810fc08e07982be2acda6f8692bca7011119e15088fcb2ab006de8dece7

    • SHA512

      76cb0b768c15464ae4dc41d90909a1c740de8e2b3f7b8d37f255068e5a0bd0c6d666e68fcfec47f6cca268de5cf24bc2a85800fb3fe3244fe25b60b8f17c5e54

    • SSDEEP

      12288:5oZtL+EP8gGVK9rI8j967NokRRC9iMdRC:XI8LVK9rI8j967NokRRsiMdA

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks