General

  • Target

    NEW_JJSploit.zip

  • Size

    408KB

  • Sample

    250112-gbbm3a1lap

  • MD5

    2791f19789ee184e7d17a4a6ecf5a84f

  • SHA1

    7837b2d22748d31368784e88e25ce5890a76a8c7

  • SHA256

    4fcb4f976aa56b66a598ffe94ff636265de995840c64470035662111e8702cd1

  • SHA512

    d7fca2820467ce21412ed27f375d87c33f4e5f5745e34aa8720a53fb36323c12f9efc5d7fd878b5e3cfb6af1f470d3588bbcd95d040c5784a588af279ec077c9

  • SSDEEP

    12288:uTOWtfmeUes659ELUOkdRe6c5uqbvAzC/Z7qth:xgme15QUefbvZ7yh

Malware Config

Targets

    • Target

      NEW_JJSploit.zip

    • Size

      408KB

    • MD5

      2791f19789ee184e7d17a4a6ecf5a84f

    • SHA1

      7837b2d22748d31368784e88e25ce5890a76a8c7

    • SHA256

      4fcb4f976aa56b66a598ffe94ff636265de995840c64470035662111e8702cd1

    • SHA512

      d7fca2820467ce21412ed27f375d87c33f4e5f5745e34aa8720a53fb36323c12f9efc5d7fd878b5e3cfb6af1f470d3588bbcd95d040c5784a588af279ec077c9

    • SSDEEP

      12288:uTOWtfmeUes659ELUOkdRe6c5uqbvAzC/Z7qth:xgme15QUefbvZ7yh

    • Detect Umbral payload

    • Modifies WinLogon for persistence

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks