General

  • Target

    c2f3bc3c8bd87178205ea3c72c1c15ff8e79586bb56c88edb1e4db3099af1cbfN.exe

  • Size

    366KB

  • Sample

    250104-j8j2ta1mew

  • MD5

    f856292a46803beda2e424494f860b00

  • SHA1

    f668d96f3134eb19690aeb24099bcc22f2f95152

  • SHA256

    c2f3bc3c8bd87178205ea3c72c1c15ff8e79586bb56c88edb1e4db3099af1cbf

  • SHA512

    686fc364d44ed83b600dcaec2544b3bbfe6850c246a93c342e3a7cc6acde09eb0db7c9fd2d942b7fe318593316d9455fcb40f7597b086c98ad5e483bb32a835d

  • SSDEEP

    6144:1loZMOrIkd8g+EtXHkv/iD4PF4sDJ6idrIJbGmTesb8e1mXXBiZgLojfLeV2givU:XoZtL+EP8PF4sDJ6idrIJbGmTf0XYZgu

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1321489615647146057/X8eF3J4Sc32NW6FJiC2nnxazCHM7RsJIN7n2vNm4MP3CDVriSFU5U8YGXQ8tm3HM8ZbV

Targets

    • Target

      c2f3bc3c8bd87178205ea3c72c1c15ff8e79586bb56c88edb1e4db3099af1cbfN.exe

    • Size

      366KB

    • MD5

      f856292a46803beda2e424494f860b00

    • SHA1

      f668d96f3134eb19690aeb24099bcc22f2f95152

    • SHA256

      c2f3bc3c8bd87178205ea3c72c1c15ff8e79586bb56c88edb1e4db3099af1cbf

    • SHA512

      686fc364d44ed83b600dcaec2544b3bbfe6850c246a93c342e3a7cc6acde09eb0db7c9fd2d942b7fe318593316d9455fcb40f7597b086c98ad5e483bb32a835d

    • SSDEEP

      6144:1loZMOrIkd8g+EtXHkv/iD4PF4sDJ6idrIJbGmTesb8e1mXXBiZgLojfLeV2givU:XoZtL+EP8PF4sDJ6idrIJbGmTf0XYZgu

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks