General

  • Target

    Fizzy Loader (infected).zip

  • Size

    88KB

  • Sample

    250101-dyndlasra1

  • MD5

    bdd562f68e39fcce44902713a1b74aa0

  • SHA1

    7a3e8189c5f040435f5ba3423959dd1de5bd1771

  • SHA256

    dcd2165bc18a4476c887c7e62358ca63cb3d3b3425b0ee09acd362d1972a679f

  • SHA512

    611c312a6638476a08a9063131b9477edc17bc6566a0cfff3f4fbf68dd38aec837160dc679615886657e0ce3ef137b40774aa671e2340366027611ef5a2bb30f

  • SSDEEP

    1536:KpLn43go769Trdlt+gvRhZ+UOSJKgzHC8iSqB83kJQwzwoMW9TkNTpZ:KpL4QDdlWUOSeYbwphkNTH

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1323224754576166912/ngAQr5IRg8PVqlg_GePwPe46g-WcVmFR7-gQu1RH44lVF1JX9hv6jSy8rNgxBAU6LxYx

Targets

    • Target

      Fizzy Loader.exe

    • Size

      229KB

    • MD5

      b56af795f8b7edc6f35a9e905921ed0e

    • SHA1

      c82cb0088bc9c93fd9a491ad278f410d44265a4d

    • SHA256

      46a67cdc899f61ccb6324d187d56b389f720d72beb02594fd60fdc4a8ca62ab4

    • SHA512

      c35b429e243845337903fa5cc6853c6921514b2fcd84e7788607aa47414be9b2101c8b87acd1766666daa7fc0cdd2b7a5be19ac5754db8f12c3e262ea792f9c6

    • SSDEEP

      6144:dloZM+rIkd8g+EtXHkv/iD4M7+QWRJ6RvSgR1E9/gF8e1mfIi:/oZtL+EP8M7+QWRJ6RvSgR1Ecqx

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks