Resubmissions

01-12-2024 09:35

241201-lkjggsyqhy 10

01-12-2024 09:26

241201-ld8g2ayqdx 10

General

  • Target

    gorebox.EXE

  • Size

    431KB

  • Sample

    241201-ld8g2ayqdx

  • MD5

    4522fc4ba239805a83c7209452595423

  • SHA1

    1a57d4e9a57bc7ef167d01928afeeab07bbd25c5

  • SHA256

    7bef7c9f99847e7c368be124992565c4bcd089948d5b1ca1d1c46911c625a5b1

  • SHA512

    a60cca224cfa06659089682637493f968c7de035b3aabcfb224eda4e50873d0c2198f9797a5acf28b7e92ea71ff246aed616fd8ce56d787679f54b6bfcee31cd

  • SSDEEP

    6144:DahOl8p0yN90QEvNIPbKK6lyO0YYO/2IKuaiTPH2g9mfCImdp2vg0FM:DiKty90tyTK5T0YYdIKoCgkfdmP

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1312707054921842768/isqncLMa7kda5iILpNOk1bl-iVzctRU9oXMRs4eMThSQUfAbARPXl6CGuwMfCK3fZjSE

Targets

    • Target

      gorebox.EXE

    • Size

      431KB

    • MD5

      4522fc4ba239805a83c7209452595423

    • SHA1

      1a57d4e9a57bc7ef167d01928afeeab07bbd25c5

    • SHA256

      7bef7c9f99847e7c368be124992565c4bcd089948d5b1ca1d1c46911c625a5b1

    • SHA512

      a60cca224cfa06659089682637493f968c7de035b3aabcfb224eda4e50873d0c2198f9797a5acf28b7e92ea71ff246aed616fd8ce56d787679f54b6bfcee31cd

    • SSDEEP

      6144:DahOl8p0yN90QEvNIPbKK6lyO0YYO/2IKuaiTPH2g9mfCImdp2vg0FM:DiKty90tyTK5T0YYdIKoCgkfdmP

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks