General

  • Target

    e07fd0ac793b06603be164c9ee73465af512cf17bed07614cbcd2a8410f04eed.exe

  • Size

    229KB

  • Sample

    241201-dmd1savmet

  • MD5

    1e10af7811808fc24065f18535cf1220

  • SHA1

    65995bcb862aa66988e1bb0dbff75dcac9b400c7

  • SHA256

    e07fd0ac793b06603be164c9ee73465af512cf17bed07614cbcd2a8410f04eed

  • SHA512

    f1c623918a3701254805e7648d671b316446a0f98637d3de62d44331cf91502afb57ccb762472491bc4ac037fbf5f7b624eb9d39092b3be0b2ed84da6f3acadc

  • SSDEEP

    6144:lloZMQfsXtioRkts/cnnK6cMldKRn/1+mpnsl3ySXCkb8e1muhi:noZItlRk83MldKRn/1+mpnsl3ySXze

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1310580388070031360/HcT5cAwFckSLk1OKu346uVDw7gzPyJJvcWmU8BKJrBQSUsE3Q1GCqDtVn5MK3JlldJBn

Targets

    • Target

      e07fd0ac793b06603be164c9ee73465af512cf17bed07614cbcd2a8410f04eed.exe

    • Size

      229KB

    • MD5

      1e10af7811808fc24065f18535cf1220

    • SHA1

      65995bcb862aa66988e1bb0dbff75dcac9b400c7

    • SHA256

      e07fd0ac793b06603be164c9ee73465af512cf17bed07614cbcd2a8410f04eed

    • SHA512

      f1c623918a3701254805e7648d671b316446a0f98637d3de62d44331cf91502afb57ccb762472491bc4ac037fbf5f7b624eb9d39092b3be0b2ed84da6f3acadc

    • SSDEEP

      6144:lloZMQfsXtioRkts/cnnK6cMldKRn/1+mpnsl3ySXCkb8e1muhi:noZItlRk83MldKRn/1+mpnsl3ySXze

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks