Resubmissions

01-12-2024 09:08

241201-k34dyayqat 10

01-12-2024 08:43

241201-kmxapaypcz 10

General

  • Target

    gorebox.EXE

  • Size

    433KB

  • Sample

    241201-k34dyayqat

  • MD5

    cc25bf7377c0ac9204180e9f7291456a

  • SHA1

    2564bdbe4d34317222e0f6d8319868f2d9310c1c

  • SHA256

    1dc70027f52c53ee62f42585d875c8ee665c62c1a3688090c4031bd443549dc3

  • SHA512

    a785074fc29f63b785aad523c8889c2c3f20f52599e6b5715f12c3aaf873fcbeb53f68b5d32a29494d90999fc9f3b3dc6e7c728f0440434aa827c7171df78195

  • SSDEEP

    6144:YahOrp0yN90QEoh+Kg4+CAQepPq06NaqQxFAyPjbBW8mpqf+JvQxPRt:Yi7y90C+T4+CAnpPqoqQx59W89+J8b

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1312553527435984916/bA-hbry9izKY0icMXgK9Nr6rEcNwmzCA1_QKEDcV4uegdqzcVCTUfnkyX2nsI1C3Coao

Targets

    • Target

      gorebox.EXE

    • Size

      433KB

    • MD5

      cc25bf7377c0ac9204180e9f7291456a

    • SHA1

      2564bdbe4d34317222e0f6d8319868f2d9310c1c

    • SHA256

      1dc70027f52c53ee62f42585d875c8ee665c62c1a3688090c4031bd443549dc3

    • SHA512

      a785074fc29f63b785aad523c8889c2c3f20f52599e6b5715f12c3aaf873fcbeb53f68b5d32a29494d90999fc9f3b3dc6e7c728f0440434aa827c7171df78195

    • SSDEEP

      6144:YahOrp0yN90QEoh+Kg4+CAQepPq06NaqQxFAyPjbBW8mpqf+JvQxPRt:Yi7y90C+T4+CAnpPqoqQx59W89+J8b

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks