General

  • Target

    230f75b72d5021a921637929a63cfd79.exe

  • Size

    231KB

  • Sample

    241213-h3gttssjaw

  • MD5

    230f75b72d5021a921637929a63cfd79

  • SHA1

    71af2ee3489d49914f7c7fa4e16e8398e97e0fc8

  • SHA256

    a5011c165dbd8459396a3b4f901c7faa668e95e395fb12d7c967c34c0d974355

  • SHA512

    3dc11aac2231daf30871d30f43eba3eadf14f3b003dd1f81466cde021b0b59d38c5e9a320e6705b4f5a0eeebf93f9ee5459173e20de2ab3ae3f3e9988819f001

  • SSDEEP

    6144:xloZMUrIkd8g+EtXHkv/iD4b3gulGELnsyd42X3Wc8b8e1mDQi:DoZrL+EP8b3gulGELnsyd42X3WxYJ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1296825633070121011/IQgwmKz7t96V-uP0AvQ6pnuefbj4O4Pfn3st5rFkKeLfDwezJAPoFvdKpDB8BZaaMgHp

Targets

    • Target

      230f75b72d5021a921637929a63cfd79.exe

    • Size

      231KB

    • MD5

      230f75b72d5021a921637929a63cfd79

    • SHA1

      71af2ee3489d49914f7c7fa4e16e8398e97e0fc8

    • SHA256

      a5011c165dbd8459396a3b4f901c7faa668e95e395fb12d7c967c34c0d974355

    • SHA512

      3dc11aac2231daf30871d30f43eba3eadf14f3b003dd1f81466cde021b0b59d38c5e9a320e6705b4f5a0eeebf93f9ee5459173e20de2ab3ae3f3e9988819f001

    • SSDEEP

      6144:xloZMUrIkd8g+EtXHkv/iD4b3gulGELnsyd42X3Wc8b8e1mDQi:DoZrL+EP8b3gulGELnsyd42X3WxYJ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks