General

  • Target

    Nebula Executor.exe

  • Size

    311KB

  • Sample

    250201-zvh6csskek

  • MD5

    d8f0449ae074e8752ec44bb5c000f0b2

  • SHA1

    a56a5838c50a83d35c0e49909f225408014a1a78

  • SHA256

    2322d185fb947885fcdd2b3a5ef43453b3318f5b997f07b6b9cb9c1865f21b6e

  • SHA512

    488bfc856814dc453b9fd5d79d4dfeeeefef85711ef2fc967881fa407ba3d332e5ca8ba557ca71796c786c14d3f9f2c2145d65c508b44dc304aa38b9763378ea

  • SSDEEP

    6144:XloZM+rIkd8g+EtXHkv/iD40TTIywvrYjhkijD6CO1b8e1m64iPpGErmx4OmoW:1oZtL+EP80TTIywvrYjhkijD6zzBPpN5

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1334897487793885335/DqXDNnseaWwv6olB_uAe8neD8KzCc2I30Po29tc1PHutPH-lPGWpxEbXiF-avm_nQE-K

Targets

    • Target

      Nebula Executor.exe

    • Size

      311KB

    • MD5

      d8f0449ae074e8752ec44bb5c000f0b2

    • SHA1

      a56a5838c50a83d35c0e49909f225408014a1a78

    • SHA256

      2322d185fb947885fcdd2b3a5ef43453b3318f5b997f07b6b9cb9c1865f21b6e

    • SHA512

      488bfc856814dc453b9fd5d79d4dfeeeefef85711ef2fc967881fa407ba3d332e5ca8ba557ca71796c786c14d3f9f2c2145d65c508b44dc304aa38b9763378ea

    • SSDEEP

      6144:XloZM+rIkd8g+EtXHkv/iD40TTIywvrYjhkijD6CO1b8e1m64iPpGErmx4OmoW:1oZtL+EP80TTIywvrYjhkijD6zzBPpN5

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks