General

  • Target

    My first crack.rar

  • Size

    80KB

  • Sample

    241220-nyfc4awnfm

  • MD5

    bd30444d4d31ce1b1ab7d0985d562c4a

  • SHA1

    8365b70e49a461166a3fa91d7a2de8b98eec68e9

  • SHA256

    dc1fd062f4b5dedf2e3c9e3a50f2c0bf6d96ec83bb12f95cab6cf47c395994b4

  • SHA512

    111462479650315c73decf7e9e0396b873d9f0e23ac35932fe56f8aec7a6e2770fbb15323e3c33c2e782c2e58777b1975cb725c5bca179f778557eec00029602

  • SSDEEP

    1536:TpcWhrJks7JCizXghk86zzFyLsM8IYVswvBAvUZyQQ/3t3braJqNKm1DedhEf0J:VX7JCibghk3zo8IYVVBBO314qNKp7l

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1319425125715673229/q2ezIsmvMrlJUcTHQhPZCbdg7jfy8TL8rSJG25gTeHqiH2m0WbS69zx7cA68K8JyC_Ni

Targets

    • Target

      Crack.exe

    • Size

      229KB

    • MD5

      54a4fef24ac2c3ee74b2999530825faa

    • SHA1

      c03fd109fe013c11a780120841b2441fb747cf51

    • SHA256

      766d71850cce1d3ce7ccecd302b3ff2049e765e48cbd69c53b4f122754a7f14f

    • SHA512

      97a5d1dd811a51200115a3f878940f4fd6ac8bd1dbf6081c251290aeec6962d277f48c02075aefbcfa672805bf4921c8a8c2abfa0bf20e76bf13c6c6738a8419

    • SSDEEP

      6144:9loZM+rIkd8g+EtXHkv/iD4AvO18il92ADe8NhoKub8e1mCi:foZtL+EP8AvO18il92ADe8Nhohs

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks