General

  • Target

    umbral.exe

  • Size

    1.6MB

  • Sample

    250131-shfq5s1lgq

  • MD5

    00d1500f2bf8bca0155b96b09d5c7294

  • SHA1

    dda7ceda5e7bc5ad5db25dcdb4c9f3713ca70e18

  • SHA256

    9bd18d2dade015a169996c0c1e36b2d8a8ea7c696660d767aff916d98d3f1ddd

  • SHA512

    1bf4b531bdfc03508ed000f0f0750b7275d8c5b965804cc8780623010ff8dbe9787f019380d3fc44a96a6ac9bc1b5cd0604f87307ea708a69e0ea1c29f762639

  • SSDEEP

    49152:4AodtaG9kS2U84B+FLan9k5TRM9zl/VjoeftKuFor:o/B1lfthar

Malware Config

Targets

    • Target

      umbral.exe

    • Size

      1.6MB

    • MD5

      00d1500f2bf8bca0155b96b09d5c7294

    • SHA1

      dda7ceda5e7bc5ad5db25dcdb4c9f3713ca70e18

    • SHA256

      9bd18d2dade015a169996c0c1e36b2d8a8ea7c696660d767aff916d98d3f1ddd

    • SHA512

      1bf4b531bdfc03508ed000f0f0750b7275d8c5b965804cc8780623010ff8dbe9787f019380d3fc44a96a6ac9bc1b5cd0604f87307ea708a69e0ea1c29f762639

    • SSDEEP

      49152:4AodtaG9kS2U84B+FLan9k5TRM9zl/VjoeftKuFor:o/B1lfthar

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks