General

  • Target

    2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN

  • Size

    257KB

  • Sample

    250112-28q48swqdr

  • MD5

    48eccdf62898683d91626bc9ec21c8b0

  • SHA1

    05b3f36379d25e8ab6748c57237e950b8ce06b21

  • SHA256

    2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0a

  • SHA512

    ad824674cfabc773d8d50088bc0b01016a6238765079a6e41752b5440c8024aedba0a45242de5969b28b27831a618bc17010f7001cb02e1786461a4b46344285

  • SSDEEP

    6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7s:doZtL+EP8u76SecjfUx1gevPeIqRWjK

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1324414504867467325/ugxr6pCjYDiPPx0dsiHqnLtebwW1baMrpC9h00piLXw8JXyaxiOvmIHCVIVxKMMhKSWQ

Targets

    • Target

      2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN

    • Size

      257KB

    • MD5

      48eccdf62898683d91626bc9ec21c8b0

    • SHA1

      05b3f36379d25e8ab6748c57237e950b8ce06b21

    • SHA256

      2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0a

    • SHA512

      ad824674cfabc773d8d50088bc0b01016a6238765079a6e41752b5440c8024aedba0a45242de5969b28b27831a618bc17010f7001cb02e1786461a4b46344285

    • SSDEEP

      6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7s:doZtL+EP8u76SecjfUx1gevPeIqRWjK

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks