General

  • Target

    6ff250ce9d1b6e4035378b40b26a609d065e567d0bdf694542557b9545aac349.exe

  • Size

    1.6MB

  • Sample

    250120-yd1teawjdz

  • MD5

    503f1f17d355b6f29515f5748e633d58

  • SHA1

    4723452c30fa9ebaaff836baa80fa88596e8e74b

  • SHA256

    6ff250ce9d1b6e4035378b40b26a609d065e567d0bdf694542557b9545aac349

  • SHA512

    3aabe3507a163eb802c556255ff2888c6c74df6aad610f1157c66e4caae29a8da063cf0b6c2bbe349e713ba1e207202174c1f0a88d7f7741559c6fe0741c16a9

  • SSDEEP

    24576:YcNnc2ZIQ2tRXUDo42d2ZCZbyLiVLVakZdwBuC/y45doBmkI+GgUVjtL:blDoh2G+LiVzAsC/y8Vb

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1326743463613435985/70y7ba1b6sFIhNg-JtWQPKaJNsYwIyDKQXMSsjnPN75MdFtAYWdvSFwlzd-whY1wFSoz

Targets

    • Target

      6ff250ce9d1b6e4035378b40b26a609d065e567d0bdf694542557b9545aac349.exe

    • Size

      1.6MB

    • MD5

      503f1f17d355b6f29515f5748e633d58

    • SHA1

      4723452c30fa9ebaaff836baa80fa88596e8e74b

    • SHA256

      6ff250ce9d1b6e4035378b40b26a609d065e567d0bdf694542557b9545aac349

    • SHA512

      3aabe3507a163eb802c556255ff2888c6c74df6aad610f1157c66e4caae29a8da063cf0b6c2bbe349e713ba1e207202174c1f0a88d7f7741559c6fe0741c16a9

    • SSDEEP

      24576:YcNnc2ZIQ2tRXUDo42d2ZCZbyLiVLVakZdwBuC/y45doBmkI+GgUVjtL:blDoh2G+LiVzAsC/y8Vb

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks