General

  • Target

    JJSploit Crack.zip

  • Size

    56.5MB

  • Sample

    250109-tb9w3stmfx

  • MD5

    2409d91e52e3ed4d5a1eb89b0f19f3a6

  • SHA1

    b1986ad365de438a3333fb61528925340b801f67

  • SHA256

    a078da52265b2ba4e13c6dee4f3eaac668c467462864515eed89df5690aedd0e

  • SHA512

    154b51b36091b428ba901a7bc4b27f14ff4617ec7ea30e988ace7efc7f89e161e22434c12e62c3388655ee656a6f359ec74516f22c9a4f4fa55bb98c01948059

  • SSDEEP

    786432:Z3py3HgxrHlvVlBPBAWbeBlbsrxJBc8054NmuPDZ3YaC+LEJd4a/7RHJVIXli7C4:W3H8HB71B1SBlbsrtPDZ3juHjF0XuC4

Malware Config

Targets

    • Target

      JJSploit Crack.zip

    • Size

      56.5MB

    • MD5

      2409d91e52e3ed4d5a1eb89b0f19f3a6

    • SHA1

      b1986ad365de438a3333fb61528925340b801f67

    • SHA256

      a078da52265b2ba4e13c6dee4f3eaac668c467462864515eed89df5690aedd0e

    • SHA512

      154b51b36091b428ba901a7bc4b27f14ff4617ec7ea30e988ace7efc7f89e161e22434c12e62c3388655ee656a6f359ec74516f22c9a4f4fa55bb98c01948059

    • SSDEEP

      786432:Z3py3HgxrHlvVlBPBAWbeBlbsrxJBc8054NmuPDZ3YaC+LEJd4a/7RHJVIXli7C4:W3H8HB71B1SBlbsrtPDZ3juHjF0XuC4

    • Detect Umbral payload

    • Modifies WinLogon for persistence

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks