General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    250116-2mc1gssmgy

  • MD5

    40aeff8340acaf040ca3c3bc883b8673

  • SHA1

    6bee9df7f7d60f9a1b811cb7f10bac5d2c3b2c24

  • SHA256

    901ecaae92ecf398de0be871e6d1aa0de8598b46e9111b8f9db73320f3b0c051

  • SHA512

    83df0f03272dda85969f6928afd5c91da7a4b8d34f1a6ed7b7a88369480d1f0fb2549a7cbe8c80598cb3e300b2d703e6fa4cf598fee7aad15879d0a0213c964c

  • SSDEEP

    6144:lloZM9rIkd8g+EtXHkv/iD4KHutxdt8e1mBuJi:noZOL+EP8CSxfc9

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1329100110281310242/4ob-EMUr-8_GRvh4pjoi6niWrlhQkQuHXlLvtsQIrwhxBMgMWyZGJ_lYeVdq9H2tkOgS

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      40aeff8340acaf040ca3c3bc883b8673

    • SHA1

      6bee9df7f7d60f9a1b811cb7f10bac5d2c3b2c24

    • SHA256

      901ecaae92ecf398de0be871e6d1aa0de8598b46e9111b8f9db73320f3b0c051

    • SHA512

      83df0f03272dda85969f6928afd5c91da7a4b8d34f1a6ed7b7a88369480d1f0fb2549a7cbe8c80598cb3e300b2d703e6fa4cf598fee7aad15879d0a0213c964c

    • SSDEEP

      6144:lloZM9rIkd8g+EtXHkv/iD4KHutxdt8e1mBuJi:noZOL+EP8CSxfc9

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks