General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    241208-scy1jawrev

  • MD5

    0cc2a414bb58a3f9e345ea56350ff9a4

  • SHA1

    09ec47af8c94ac3a94ad0e29df8a1405a6bc9e01

  • SHA256

    2ce5ab90e160d795bee80f40ab817b2beb35fb43845e61658942eda4ca0b376c

  • SHA512

    007ea98156043b18be5a612741ca9d2a0494dd5a5f7cea06a27185ac0de3950dd295d7e5066ea4313e3c517159b96450397e9645798fb2a2abd92ab8c21adccb

  • SSDEEP

    6144:tloZM0rIkd8g+EtXHkv/iD4eKbNoOJBiVHaIJtM9Xb8e1mgri:voZDL+EP8eKbNoOJBiVHaIJtMZ3m

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1315042987738271906/DA_h572ndjn1BlePnD8XOQjC3fkvpimY8QR3cl8FiFBAV59Fb8w7SI3yb2MlOJn8omh8

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      0cc2a414bb58a3f9e345ea56350ff9a4

    • SHA1

      09ec47af8c94ac3a94ad0e29df8a1405a6bc9e01

    • SHA256

      2ce5ab90e160d795bee80f40ab817b2beb35fb43845e61658942eda4ca0b376c

    • SHA512

      007ea98156043b18be5a612741ca9d2a0494dd5a5f7cea06a27185ac0de3950dd295d7e5066ea4313e3c517159b96450397e9645798fb2a2abd92ab8c21adccb

    • SSDEEP

      6144:tloZM0rIkd8g+EtXHkv/iD4eKbNoOJBiVHaIJtM9Xb8e1mgri:voZDL+EP8eKbNoOJBiVHaIJtMZ3m

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks