General

  • Target

    b9045f409b3fe27fca2b639fd2620043c2d999e04e45f642841b739bb860af8dN.exe

  • Size

    229KB

  • Sample

    250120-hlxhyswrcz

  • MD5

    ba8d399c9ae62d44f0bebcf5cfde9960

  • SHA1

    c9e8160c6854459b52f851d516fd0c305b292642

  • SHA256

    b9045f409b3fe27fca2b639fd2620043c2d999e04e45f642841b739bb860af8d

  • SHA512

    a66f6ba994ad91f645ea68a0e06691bf8d12cfe543f52f763326d2d03b3a3efeee163390503ed44dd65f929a03cbb9cbd2ca52afd5db83f75b1be5dc10fc573a

  • SSDEEP

    6144:lloZMHrIkd8g+EtXHkv/iD4Whm7EsyVtGETOMdRYy6b8e1mreMi:noZIL+EP8WhOEsyVtGETOMdRYpd

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1313268797653909504/hRePkp7ZEpI7vle-oSoQrgYdB9VOq9lV_5DXfMgcc26uoB6oVfDx_9CtEaLOGtUEUxia

Targets

    • Target

      b9045f409b3fe27fca2b639fd2620043c2d999e04e45f642841b739bb860af8dN.exe

    • Size

      229KB

    • MD5

      ba8d399c9ae62d44f0bebcf5cfde9960

    • SHA1

      c9e8160c6854459b52f851d516fd0c305b292642

    • SHA256

      b9045f409b3fe27fca2b639fd2620043c2d999e04e45f642841b739bb860af8d

    • SHA512

      a66f6ba994ad91f645ea68a0e06691bf8d12cfe543f52f763326d2d03b3a3efeee163390503ed44dd65f929a03cbb9cbd2ca52afd5db83f75b1be5dc10fc573a

    • SSDEEP

      6144:lloZMHrIkd8g+EtXHkv/iD4Whm7EsyVtGETOMdRYy6b8e1mreMi:noZIL+EP8WhOEsyVtGETOMdRYpd

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks