General

  • Target

    Loader.exe

  • Size

    496KB

  • Sample

    250119-rkcxla1qcn

  • MD5

    5679fd7303147ee1bc6c4adc979de286

  • SHA1

    65354bef2646e0d6536ed4ca614839c4e245ad16

  • SHA256

    cbf4e042e45bf47e1070d666b8078444303b423ecb62fe98ee9a11c905b4fd16

  • SHA512

    6d0f2241a55c1549cc9e02fdd7f0368548a3c933772ffb5a8a3bf47a9743470fe017f4bf6e5dad0f4b87111416418db67b6cb4a887378ee3ef88554e0f80c221

  • SSDEEP

    12288:ZoZ1tlRk83Mlp6BpcCFdWXp8aLLy5MvOAs:q5r3bBpcCFdWXp8aLLy5yq

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1299393161311027211/nrm0Am6pa5NSYbd2OqLmH7aFF8MqPekvxp2H_g1oUHIAhFVn25ciuIz9WjipPG-HMhFc

Targets

    • Target

      Loader.exe

    • Size

      496KB

    • MD5

      5679fd7303147ee1bc6c4adc979de286

    • SHA1

      65354bef2646e0d6536ed4ca614839c4e245ad16

    • SHA256

      cbf4e042e45bf47e1070d666b8078444303b423ecb62fe98ee9a11c905b4fd16

    • SHA512

      6d0f2241a55c1549cc9e02fdd7f0368548a3c933772ffb5a8a3bf47a9743470fe017f4bf6e5dad0f4b87111416418db67b6cb4a887378ee3ef88554e0f80c221

    • SSDEEP

      12288:ZoZ1tlRk83Mlp6BpcCFdWXp8aLLy5MvOAs:q5r3bBpcCFdWXp8aLLy5yq

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks