General

  • Target

    launcher.exe.exe

  • Size

    40.0MB

  • Sample

    241206-nkrh7s1ldq

  • MD5

    bad6b4ffa6b16bbd802f3f4f887760b2

  • SHA1

    d45d0a086cf87cf14aa129a9b34d5c9f80ab6ae2

  • SHA256

    a13dd805f2700173d410809954b9d98ae3586c0c65c20270a378887d83b738b0

  • SHA512

    fc0398c9ab294dc3f379e1129fbb20e35fcbae728a1619aa3c1f316541dbbb717d9662feca11dd2e1f45c814b2debb9468b99830c8ea33ebff47bc474a87cd1c

  • SSDEEP

    786432:IDOEGyqaCfzdbbTBYlx6Tstl7wi48Yi/xOMx75Ss5VR4L50IhbURTq3:ID7glBYyYtxw58rxOMFXRRIhbU1O

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1309680533873360936/uVtzVucttcbKyCjWXREr4bqVIC4bqsg6Vda7TrljGA2r8SckL-SAvJtdmPA1c9E72q_q

Targets

    • Target

      launcher.exe.exe

    • Size

      40.0MB

    • MD5

      bad6b4ffa6b16bbd802f3f4f887760b2

    • SHA1

      d45d0a086cf87cf14aa129a9b34d5c9f80ab6ae2

    • SHA256

      a13dd805f2700173d410809954b9d98ae3586c0c65c20270a378887d83b738b0

    • SHA512

      fc0398c9ab294dc3f379e1129fbb20e35fcbae728a1619aa3c1f316541dbbb717d9662feca11dd2e1f45c814b2debb9468b99830c8ea33ebff47bc474a87cd1c

    • SSDEEP

      786432:IDOEGyqaCfzdbbTBYlx6Tstl7wi48Yi/xOMx75Ss5VR4L50IhbURTq3:ID7glBYyYtxw58rxOMFXRRIhbU1O

    • Detect Umbral payload

    • Modifies WinLogon for persistence

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks