General

  • Target

    Nursultan Crack 1.16.5 (infected).7z

  • Size

    111KB

  • Sample

    250106-hnnzlazjct

  • MD5

    12e7124cf069c75347e8291b5a682f85

  • SHA1

    c66a93d01796b51f81577cfd4629b439e69da530

  • SHA256

    e36bae9f31355d5d5ffdb550c1d7d1c0f88a7f52f7bae1288a6f9e5008f6471b

  • SHA512

    5f0cc0697b68e7fa64df395e38a8586299aa97f3d33316cea3458591f7d83d36b7f319a6ad83773368e8d04ddd53f6a5f6b0a2d054d3480e565375a1a495f775

  • SSDEEP

    1536:ymRAf4Fyhjpllzf89PZBmEdKPWCniAaPzJFUUjRIK+zzGhUQrosmgvP4+9iMagHo:yE50VU9xiW7L0USSuQwgvPHIkQIGR

Malware Config

Targets

    • Target

      Nursultan Crack 1.16.5 (infected).7z

    • Size

      111KB

    • MD5

      12e7124cf069c75347e8291b5a682f85

    • SHA1

      c66a93d01796b51f81577cfd4629b439e69da530

    • SHA256

      e36bae9f31355d5d5ffdb550c1d7d1c0f88a7f52f7bae1288a6f9e5008f6471b

    • SHA512

      5f0cc0697b68e7fa64df395e38a8586299aa97f3d33316cea3458591f7d83d36b7f319a6ad83773368e8d04ddd53f6a5f6b0a2d054d3480e565375a1a495f775

    • SSDEEP

      1536:ymRAf4Fyhjpllzf89PZBmEdKPWCniAaPzJFUUjRIK+zzGhUQrosmgvP4+9iMagHo:yE50VU9xiW7L0USSuQwgvPHIkQIGR

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks