General

  • Target

    roblox beamer.exe

  • Size

    229KB

  • Sample

    241224-zt5b7sxmel

  • MD5

    e8291587d7fd8bc8704e1115abe62ac6

  • SHA1

    6a71de3d8aece949377efd526a222939ad3a01f5

  • SHA256

    fb909a020c044cd3da4445891bbf2e3dbeb9527e84ce04efc0640b43061da547

  • SHA512

    806a572f8784a37138b4fb19b4b7dbc93ef2b7e14aba9bb3a78c2d6a3882f1c0b5eb36c21e98065f7c5454a9e33f07aa200b13fb2cebd8a52c16b401603cf994

  • SSDEEP

    6144:qloZM+rIkd8g+EtXHkv/iD4EjKLBPUon+WvRsY9GLb8e1mji:UoZtL+EP8EjKLBPUon+WvRsY9wZ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1152961921033715743/CDLHLQ0cTzYVPLUJlX--rQL-OhDTmViTrV95RJR2MIv25RRoK7gTnU4u5nzknzyl2O1Z

Targets

    • Target

      roblox beamer.exe

    • Size

      229KB

    • MD5

      e8291587d7fd8bc8704e1115abe62ac6

    • SHA1

      6a71de3d8aece949377efd526a222939ad3a01f5

    • SHA256

      fb909a020c044cd3da4445891bbf2e3dbeb9527e84ce04efc0640b43061da547

    • SHA512

      806a572f8784a37138b4fb19b4b7dbc93ef2b7e14aba9bb3a78c2d6a3882f1c0b5eb36c21e98065f7c5454a9e33f07aa200b13fb2cebd8a52c16b401603cf994

    • SSDEEP

      6144:qloZM+rIkd8g+EtXHkv/iD4EjKLBPUon+WvRsY9GLb8e1mji:UoZtL+EP8EjKLBPUon+WvRsY9wZ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks