Resubmissions

26-12-2024 12:33

241226-pq936swkbl 10

26-12-2024 12:21

241226-pjphwsvrgp 10

26-12-2024 12:12

241226-pdcbdavpax 10

23-12-2024 17:23

241223-vyh8bawkdz 10

23-12-2024 17:02

241223-vj7x5avqfs 7

23-12-2024 16:41

241223-t6493svnav 10

23-12-2024 16:30

241223-tz4d7svldy 4

23-12-2024 16:09

241223-tl5ecatrcv 10

22-12-2024 23:42

241222-3qhwksskhk 6

22-12-2024 23:31

241222-3hxprssjgm 10

General

  • Target

    https://youtube.com

  • Sample

    241226-pq936swkbl

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1321218560835457096/lD3OVCiOK-acMzfeU7SESfR0F0UfH0sPRT29r5gwu_KsLWvgiWvVBBy2yTp09PB9QrZW

Targets

    • Target

      https://youtube.com

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • A potential corporate email address has been identified in the URL: =@L

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

MITRE ATT&CK Enterprise v15

Tasks