Resubmissions

25-01-2025 06:58

250125-hrxqxa1mhy 10

25-01-2025 06:55

250125-hpr3ms1max 10

General

  • Target

    SU.exe

  • Size

    229KB

  • Sample

    250125-hrxqxa1mhy

  • MD5

    05c943e8ae5c31ffe2dfd3eff82aa5c1

  • SHA1

    6687440528a26ae933709e79ff486cb5727bb881

  • SHA256

    01fb336066beb7d69b8a498acd0c01a0f7a49fb1f3ddfe9e28d2cc628132110c

  • SHA512

    79e937aae114229690b11e43ced2a61886b40f57b91e04f24a6b3f6db0f2e2008dac1b44bba274fb75befcbb1bc109b41ac60ac3820c1ff834c68dac3756943b

  • SSDEEP

    6144:9loZMNrIkd8g+EtXHkv/iD4N1yBR/k4XxG/BcoNS3b8e1mEXi:foZmL+EP8N1yBR/k4XxG/BcoNkfy

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1318819333895356468/DEfudpHlXMg4k0ZoAl3E4nwXAVdcdawYy71fFBAqS4QpsLYniui-m6zHK2-B_vFeH8mM

Targets

    • Target

      SU.exe

    • Size

      229KB

    • MD5

      05c943e8ae5c31ffe2dfd3eff82aa5c1

    • SHA1

      6687440528a26ae933709e79ff486cb5727bb881

    • SHA256

      01fb336066beb7d69b8a498acd0c01a0f7a49fb1f3ddfe9e28d2cc628132110c

    • SHA512

      79e937aae114229690b11e43ced2a61886b40f57b91e04f24a6b3f6db0f2e2008dac1b44bba274fb75befcbb1bc109b41ac60ac3820c1ff834c68dac3756943b

    • SSDEEP

      6144:9loZMNrIkd8g+EtXHkv/iD4N1yBR/k4XxG/BcoNS3b8e1mEXi:foZmL+EP8N1yBR/k4XxG/BcoNkfy

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks