General

  • Target

    Rich Executor.exe

  • Size

    285KB

  • Sample

    250115-3fa3zszla1

  • MD5

    16784b440d687c01015d992d63908bf8

  • SHA1

    49f6cd11f32f093329e8fde5d710c3fbe41f3c7d

  • SHA256

    da9b33d28f4984317ffacf61df2b1b975e09babbec5c7ef8d0ec91ad3eb810f9

  • SHA512

    d29bda5ab0b4e62a263eb77a76081e705624f2a93c2d1f7730805df409777f3eaaea6673b65e45f3e63b0f3e56bc7938a861685e6b73452097e371022eff981f

  • SSDEEP

    6144:6loZM+rIkd8g+EtXHkv/iD4xiNArRiK1XwBzOurfkb8e1m9izE2HV:EoZtL+EP8xiNArRiK1XwBzOurM79

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1329227551364612146/MjioVS6yEMfAvkJskGFnyiqY37leOjW-uiXtsO-NePquHCaIszfgCydv7LuhTZDCijFh

Targets

    • Target

      Rich Executor.exe

    • Size

      285KB

    • MD5

      16784b440d687c01015d992d63908bf8

    • SHA1

      49f6cd11f32f093329e8fde5d710c3fbe41f3c7d

    • SHA256

      da9b33d28f4984317ffacf61df2b1b975e09babbec5c7ef8d0ec91ad3eb810f9

    • SHA512

      d29bda5ab0b4e62a263eb77a76081e705624f2a93c2d1f7730805df409777f3eaaea6673b65e45f3e63b0f3e56bc7938a861685e6b73452097e371022eff981f

    • SSDEEP

      6144:6loZM+rIkd8g+EtXHkv/iD4xiNArRiK1XwBzOurfkb8e1m9izE2HV:EoZtL+EP8xiNArRiK1XwBzOurM79

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks