General

  • Target

    restaddagethrowcorned.exe

  • Size

    230KB

  • Sample

    250202-pbbxts1kas

  • MD5

    2523f6fce113a0b9e94bd66d8cf2966b

  • SHA1

    076d32cb0f32d5df6a4dc538beb7796261b76ffc

  • SHA256

    a90ab751bfb8cb4daee6dbb9a595c4af981c9792f245b87f821740fdf3ab28ce

  • SHA512

    c71d6c35be27bc90cd525b156e9bb016dab578740fcce3357382b52a1e4b0e4c42d55dd57e313c1f1db285d481f4e6a6a871da389b6d4076897553856aaaf5d5

  • SSDEEP

    6144:eloZM+rIkd8g+EtXHkv/iD4xfQtxoj8e1mdi:IoZtL+EP85gxoD

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1335579296168677427/9LqHJjwqIZwrPU0xd2FMLdQqVxYJxToJJxSNRDB2t6_oQEmXOtpluiaF922h2aOifQ8h

Targets

    • Target

      restaddagethrowcorned.exe

    • Size

      230KB

    • MD5

      2523f6fce113a0b9e94bd66d8cf2966b

    • SHA1

      076d32cb0f32d5df6a4dc538beb7796261b76ffc

    • SHA256

      a90ab751bfb8cb4daee6dbb9a595c4af981c9792f245b87f821740fdf3ab28ce

    • SHA512

      c71d6c35be27bc90cd525b156e9bb016dab578740fcce3357382b52a1e4b0e4c42d55dd57e313c1f1db285d481f4e6a6a871da389b6d4076897553856aaaf5d5

    • SSDEEP

      6144:eloZM+rIkd8g+EtXHkv/iD4xfQtxoj8e1mdi:IoZtL+EP85gxoD

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks