General

  • Target

    9fa71bd01a54e0726de72e272bcbe6eb.bin

  • Size

    1.1MB

  • Sample

    241215-by1b2sskar

  • MD5

    c43bede4625721bf7cc3ccda79e8d20e

  • SHA1

    33389c3ca664e67de91bf05fb593870bb2ad1bf0

  • SHA256

    fa555466f14c6d14d460a00c87489b5f4f2b0bb4670ca58d6a6d943192c556e9

  • SHA512

    06b8bad9d5005885a1588782d77622cfa14f4afe03cd163254ca23f6b0a3ae81ad83342a689f6ad6d77bfcba6337c93ad487b140f1a088da5cdfeb6bd6ccd9f7

  • SSDEEP

    24576:HKGsSB5V/tLAcKMzBKOfADAaepZ9seUp2r3vYfTvPV8p:HKxSl/t+Mz8OfADAaeDes7vYLvQ

Malware Config

Targets

    • Target

      666d91620d589b16b55f847c0c84396419461844d9ab844ad39a7df9d88c34e5.exe

    • Size

      1.3MB

    • MD5

      9fa71bd01a54e0726de72e272bcbe6eb

    • SHA1

      03822545415f9dc69207495898c706c0d8340807

    • SHA256

      666d91620d589b16b55f847c0c84396419461844d9ab844ad39a7df9d88c34e5

    • SHA512

      32eaa6c191f077de67251af4057ee9fee6d9ea69d58ce6d6a1c6f5623ba26013152ae614d1465939f44ad9e2125caed786fa4abc821082845037a9ab1d2a27af

    • SSDEEP

      24576:x0kpqP4E3+rAOymAfu86lJ5qKYv8aIlbRnxYUsNV/qXOlY/nZZMR:kwKcATbG8TKrOlNxqXTvMR

    • Detect Umbral payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks