General

  • Target

    rassword1234 (1234).zip

  • Size

    91KB

  • Sample

    250101-d1ymcasrgz

  • MD5

    db90b8f68e201b3bc7dabb585840bc20

  • SHA1

    12cfcc306937a172e27588bc55e08b38e6323e93

  • SHA256

    384aa67fa0f32cf50cf1e51d0372e66bb05ccc32fbc353328337a50cf6f27f50

  • SHA512

    09c3445ad6fd8dc7d713dc05a8ee68caffcf049f2789b22867a2bcdef173b11e17843791653523f9dd4fa72ac1b05f2831e4c70eca990bfad644ae4ad630d77e

  • SSDEEP

    1536:Gb+0sj9snLsi+HiUqpyRZW7kXZIgb2aZaarA4GJG7oNUOVEI79m6DcoZoLCmp8Kd:Gb+0sj+LsV874ZNDAMPkfNUOV1zZXmzd

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1323573810049323031/dk-sXtjCoHS8zh-0KkPlF-dduFzLCiHy-YsKxuLn1B_D2U_NGlbGreTuDpJJpPerog_U

Targets

    • Target

      rassword1234/cheat.exe

    • Size

      229KB

    • MD5

      cd8c210fc317138b5e27619acfec272c

    • SHA1

      b7434937fe520f90be7bd201a98e0bc5e7e42cb1

    • SHA256

      d9e775b843c911bbe67e18bfec500437fc5357968ad5ba814c9bff8db5e3bca6

    • SHA512

      b70f654a6724d0091f9b2a19347bae84d1e95378678a507c019c3a203df50560304a72cadc2f38defb2e7a1a46a1a1902e6410706f6fdd391464c57835427127

    • SSDEEP

      6144:lloZM9rIkd8g+EtXHkv/iD4bxv/GELnsTd42X3WbVb8e1mRi:noZmL+EP8bxv/GELnsTd42X3Wxf

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks