General

  • Target

    upx.exe

  • Size

    230KB

  • Sample

    241229-m1ph4szmev

  • MD5

    de2d4e3d82dc91ee44c91793de896c7a

  • SHA1

    3b8db665d3666be6a4234c801b9ca93ced36655e

  • SHA256

    2744f1315bfa21aef381540d3ad53bc90cf15a8513905aba442b4610e8f0c337

  • SHA512

    6a257e6df13bd6dcc1452fa692515b955896f1141aad84110ceaad5a3a929607586c849bcfdb161d648e89c53d747a39e564551172fd36c1e440618346b7b40f

  • SSDEEP

    6144:jloZM+rIkd8g+EtXHkv/iD4Ff6Cj5nsAv7OXZkQlPJXb8e1mq/i:BoZtL+EP8t6Cj5nsAv7OXZkQllNq

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1286714539492249691/WGN7-dFwgZ0rCdSawTA_6w4aqFusamrpnEHJq2mpQA-uVYCCW9OCO2W1dKDE0JeS5MPw

Targets

    • Target

      upx.exe

    • Size

      230KB

    • MD5

      de2d4e3d82dc91ee44c91793de896c7a

    • SHA1

      3b8db665d3666be6a4234c801b9ca93ced36655e

    • SHA256

      2744f1315bfa21aef381540d3ad53bc90cf15a8513905aba442b4610e8f0c337

    • SHA512

      6a257e6df13bd6dcc1452fa692515b955896f1141aad84110ceaad5a3a929607586c849bcfdb161d648e89c53d747a39e564551172fd36c1e440618346b7b40f

    • SSDEEP

      6144:jloZM+rIkd8g+EtXHkv/iD4Ff6Cj5nsAv7OXZkQlPJXb8e1mq/i:BoZtL+EP8t6Cj5nsAv7OXZkQllNq

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks