General

  • Target

    05d89012ff0100526b06b84ea4ed992d8a3dc37198d2377eccc3e0a9d252880fN.exe

  • Size

    231KB

  • Sample

    241216-q2c39a1rdw

  • MD5

    01270329ba245395e02d8c9aa0d9fdf0

  • SHA1

    edd621594425fddf0d13547a2cb4da372cafc273

  • SHA256

    05d89012ff0100526b06b84ea4ed992d8a3dc37198d2377eccc3e0a9d252880f

  • SHA512

    820da28c393a16658f8cc0f6b023e5028d5bd95799d9a1b2cbda2e49367532133322c2b27daa19ef53c6fc3859fa168a98272e44e27a17be064d511db194e137

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4ZlSY1DA0r6SjVg8ZHjb8e1mrji:joZtL+EP8ZlSY1DA0r6SjVg8ZHt

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1253306798744797185/iokeoOfhnNmE9mtSTCYJYh7mMtIMja7PsUY89dQwaEBBNLKdujHp-4-enD1X7BYaVQdr

Targets

    • Target

      05d89012ff0100526b06b84ea4ed992d8a3dc37198d2377eccc3e0a9d252880fN.exe

    • Size

      231KB

    • MD5

      01270329ba245395e02d8c9aa0d9fdf0

    • SHA1

      edd621594425fddf0d13547a2cb4da372cafc273

    • SHA256

      05d89012ff0100526b06b84ea4ed992d8a3dc37198d2377eccc3e0a9d252880f

    • SHA512

      820da28c393a16658f8cc0f6b023e5028d5bd95799d9a1b2cbda2e49367532133322c2b27daa19ef53c6fc3859fa168a98272e44e27a17be064d511db194e137

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD4ZlSY1DA0r6SjVg8ZHjb8e1mrji:joZtL+EP8ZlSY1DA0r6SjVg8ZHt

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks