General

  • Target

    Nursultan CrackLauncher (infected).zip

  • Size

    370KB

  • Sample

    250101-d4tskawkaj

  • MD5

    7268ab836cf40a9f014de23d3541f3e1

  • SHA1

    a5515ed5310deab8dfa5609eaaa2d55725f98a56

  • SHA256

    845412b126125d6581e02480cb372ab7e867c9c36dab2d67e09b7a3cbe4d2194

  • SHA512

    0ec3326f1fe6e6874496d3c725811f418c0b0d9ea487cfa4ce5f0edf52bf18730af501cdd83dcd079e8a027219f16187e5e86bab95920cbc82a3cf6ce2efceb0

  • SSDEEP

    6144:wunj7WIjEW6h7XRshfNZu+8SrFbslmJrp6zMvTNlOU2g2Pn8Qgv:wCWIo7XeAylslGrp6432Nfcv

Malware Config

Targets

    • Target

      CrackLauncher.exe

    • Size

      376KB

    • MD5

      2a62ae30d23236f10284cec83783dda1

    • SHA1

      04c528b61e01e6444ca30bc346dd6f38d4e8c8a6

    • SHA256

      fdbda1e73337813b63b388173d5311bcb9198d73ad4a0f15661af5fb5680f219

    • SHA512

      321868f629f5fba5f2144192598327081744ca22938d371fe480a6fcd54ffb9665c056452c5d7092a330c770f49167d4830435a2f7a8c3a9c2d2a78dd95c39ea

    • SSDEEP

      6144:CR9tZo8WQzx19RgGppFWFC71UbyenXtL/Z0EyzPsO5FR0guVi389xaYVQ:CR7ZnVfMGTFgCZWRnXJOEyTD5T0guVu7

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks