General

  • Target

    FN_kolt_woofer.exe

  • Size

    229KB

  • Sample

    241228-tr2kmszkat

  • MD5

    88e82fa4e92eaed5b089d99ca669fbd3

  • SHA1

    c6287977d98930e7022fc1c6dfbfc4e302b724c8

  • SHA256

    1a4e8449edc0e1f28f95ee9eaba0129264d90168797e65c47502996b15fbcde5

  • SHA512

    5759f49a352d54c5d6be12b9f03d15757a802bde7da91f28bdac2ccc22f1afb852e3d734e54eb2e7f2129c8c4213421f991692882a15569a93430e137c1d1e7b

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4T6FcHdmOhyU9va6vyvb8e1mti:noZtL+EP8T6FcHdmOhyU9va6vM/

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1322576460233310239/6_wiWtzQcW0DjdxEb7s3m1q1GXR6Nn8yox-lCYNIkeI8fCOrmCSg8qqtlHFzL-ivzVr6

Targets

    • Target

      FN_kolt_woofer.exe

    • Size

      229KB

    • MD5

      88e82fa4e92eaed5b089d99ca669fbd3

    • SHA1

      c6287977d98930e7022fc1c6dfbfc4e302b724c8

    • SHA256

      1a4e8449edc0e1f28f95ee9eaba0129264d90168797e65c47502996b15fbcde5

    • SHA512

      5759f49a352d54c5d6be12b9f03d15757a802bde7da91f28bdac2ccc22f1afb852e3d734e54eb2e7f2129c8c4213421f991692882a15569a93430e137c1d1e7b

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4T6FcHdmOhyU9va6vyvb8e1mti:noZtL+EP8T6FcHdmOhyU9va6vM/

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks