General

  • Target

    Swift.exe

  • Size

    231KB

  • Sample

    250104-vm97naylhz

  • MD5

    6e2fe62ba106a5e869fabb48565305ed

  • SHA1

    56a781fe3ed0182ae22c6c10690d2ae4e870be6e

  • SHA256

    b0994dcb3d7268ace7b5fd363bf09683e2ba2d900149151602c277f36548c1a5

  • SHA512

    48759991bed49f9366f088b15a3794c45189951b73aba3b977b16070d51067b2216c3740654c387fcc28bef159393c0d01923c84d1f029b8412957652fb9867e

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4j0iWVjgULryD1Ac5hJ5b8e1mDvi:joZtL+EP8j0iWVjgULryD1Ac5vRR

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1325147610498990184/_S5t34piVZ9w4jNK0Uk7vmAagN7mrlofpStBmLWZihZU4CFArBMOQ3stCZ2bi-ynKaHD

Targets

    • Target

      Swift.exe

    • Size

      231KB

    • MD5

      6e2fe62ba106a5e869fabb48565305ed

    • SHA1

      56a781fe3ed0182ae22c6c10690d2ae4e870be6e

    • SHA256

      b0994dcb3d7268ace7b5fd363bf09683e2ba2d900149151602c277f36548c1a5

    • SHA512

      48759991bed49f9366f088b15a3794c45189951b73aba3b977b16070d51067b2216c3740654c387fcc28bef159393c0d01923c84d1f029b8412957652fb9867e

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD4j0iWVjgULryD1Ac5hJ5b8e1mDvi:joZtL+EP8j0iWVjgULryD1Ac5vRR

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks