General

  • Target

    c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37dN.exe

  • Size

    229KB

  • Sample

    250107-klvqgavpep

  • MD5

    528f26b2d46cd04b6fcb6fafcb3abf40

  • SHA1

    857455c1dcdcd7bceabfff1f532ee3714e743245

  • SHA256

    c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37d

  • SHA512

    20c0c8b69d8fb6045ac3f2e83fca527ac99a68375e62b4b3d8d66daa402ddfad1640f63721871aa2254bf71bb58beae2ef30a50154ef9dc6fa6c4a35999d8c5a

  • SSDEEP

    6144:FloZM+rIkd8g+EtXHkv/iD4AFyuMS1NmYzus9x4uab8e1mti:HoZtL+EP8AFyuMS1NmYzus9x45j

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1313811831906762792/0E535NbdSliQWNEaFE2OeKp9ttWU5OcljhalGUnuKioPrSNPnNb45qh5ZMmcXLPrAWI1

Targets

    • Target

      c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37dN.exe

    • Size

      229KB

    • MD5

      528f26b2d46cd04b6fcb6fafcb3abf40

    • SHA1

      857455c1dcdcd7bceabfff1f532ee3714e743245

    • SHA256

      c4d045d0748ee08c602a1fc3a46b1498ce7297c18f12f9db44ea2b2dbfb4e37d

    • SHA512

      20c0c8b69d8fb6045ac3f2e83fca527ac99a68375e62b4b3d8d66daa402ddfad1640f63721871aa2254bf71bb58beae2ef30a50154ef9dc6fa6c4a35999d8c5a

    • SSDEEP

      6144:FloZM+rIkd8g+EtXHkv/iD4AFyuMS1NmYzus9x4uab8e1mti:HoZtL+EP8AFyuMS1NmYzus9x45j

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks