General
-
Target
umbral.exe
-
Size
1.6MB
-
Sample
250131-shfq5s1lgq
-
MD5
00d1500f2bf8bca0155b96b09d5c7294
-
SHA1
dda7ceda5e7bc5ad5db25dcdb4c9f3713ca70e18
-
SHA256
9bd18d2dade015a169996c0c1e36b2d8a8ea7c696660d767aff916d98d3f1ddd
-
SHA512
1bf4b531bdfc03508ed000f0f0750b7275d8c5b965804cc8780623010ff8dbe9787f019380d3fc44a96a6ac9bc1b5cd0604f87307ea708a69e0ea1c29f762639
-
SSDEEP
49152:4AodtaG9kS2U84B+FLan9k5TRM9zl/VjoeftKuFor:o/B1lfthar
Static task
static1
Behavioral task
behavioral1
Sample
umbral.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
umbral.exe
-
Size
1.6MB
-
MD5
00d1500f2bf8bca0155b96b09d5c7294
-
SHA1
dda7ceda5e7bc5ad5db25dcdb4c9f3713ca70e18
-
SHA256
9bd18d2dade015a169996c0c1e36b2d8a8ea7c696660d767aff916d98d3f1ddd
-
SHA512
1bf4b531bdfc03508ed000f0f0750b7275d8c5b965804cc8780623010ff8dbe9787f019380d3fc44a96a6ac9bc1b5cd0604f87307ea708a69e0ea1c29f762639
-
SSDEEP
49152:4AodtaG9kS2U84B+FLan9k5TRM9zl/VjoeftKuFor:o/B1lfthar
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1