General

  • Target

    591be99ca233dc0bfb5e64b9fc22309c7019f401375aa2fcf0fc87ef3789c371N.exe

  • Size

    231KB

  • Sample

    250116-m7wwrsykdp

  • MD5

    6666c618cfef7187d04f9eb7d0cda700

  • SHA1

    3a3ae164b936113dd895dc1d6bf69ff8e13b4ebe

  • SHA256

    591be99ca233dc0bfb5e64b9fc22309c7019f401375aa2fcf0fc87ef3789c371

  • SHA512

    10b100b9c8d173a1d340e76325b2a52273ef9121c2b560f80d26e785606e60a5a291d9df3f80b442b0ab9e0a5368344881beca4236d604021a74a78ba1acc3ce

  • SSDEEP

    6144:RloZM9rIkd8g+EtXHkv/iD4vhjKEKtFuYr20VJg1Jb8e1mti:joZOL+EP8vhjKEKtFuYr20VJgPr

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1327206784108068875/wzjvx_5jjHa7l3Jym0vEqbJGwBZ_PiZ2-3fjL-iIU9GxWktZs0oQfJSna-a2M5Mce2pb

Targets

    • Target

      591be99ca233dc0bfb5e64b9fc22309c7019f401375aa2fcf0fc87ef3789c371N.exe

    • Size

      231KB

    • MD5

      6666c618cfef7187d04f9eb7d0cda700

    • SHA1

      3a3ae164b936113dd895dc1d6bf69ff8e13b4ebe

    • SHA256

      591be99ca233dc0bfb5e64b9fc22309c7019f401375aa2fcf0fc87ef3789c371

    • SHA512

      10b100b9c8d173a1d340e76325b2a52273ef9121c2b560f80d26e785606e60a5a291d9df3f80b442b0ab9e0a5368344881beca4236d604021a74a78ba1acc3ce

    • SSDEEP

      6144:RloZM9rIkd8g+EtXHkv/iD4vhjKEKtFuYr20VJg1Jb8e1mti:joZOL+EP8vhjKEKtFuYr20VJgPr

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks