General

  • Target

    Umbra1l.bin

  • Size

    229KB

  • Sample

    250202-tmhxqs1lhp

  • MD5

    d4b3962331fd69d60450d4bf2a4e082d

  • SHA1

    e0f0a331505e6a6d33886a450365d1412d34ba19

  • SHA256

    6a426a8c30989c1f079a3d13b675eb1cd0c888d353a97e0233c8786fb3c2ab86

  • SHA512

    1273506c488bec41bb3e7da428825a7d39d067a25de8b52a8408623614cdc8894b4a3cfaf1004ec686ceae647224ef3b9021149303b76b5b1266103e6ac0f200

  • SSDEEP

    6144:tloZMmrIkd8g+EtXHkv/iD44zOjlTwk7diTlwsJgbb8e1mci:voZ1L+EP84zOjlTwk7diTlwsJim

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1335641981073756170/seSOvsSZqaqoC5zgxEHDiCcOuEtW37kL715-jtQomsdu_hU2kpn5cf3wo-E3CcPUcXb9

Targets

    • Target

      Umbra1l.bin

    • Size

      229KB

    • MD5

      d4b3962331fd69d60450d4bf2a4e082d

    • SHA1

      e0f0a331505e6a6d33886a450365d1412d34ba19

    • SHA256

      6a426a8c30989c1f079a3d13b675eb1cd0c888d353a97e0233c8786fb3c2ab86

    • SHA512

      1273506c488bec41bb3e7da428825a7d39d067a25de8b52a8408623614cdc8894b4a3cfaf1004ec686ceae647224ef3b9021149303b76b5b1266103e6ac0f200

    • SSDEEP

      6144:tloZMmrIkd8g+EtXHkv/iD44zOjlTwk7diTlwsJgbb8e1mci:voZ1L+EP84zOjlTwk7diTlwsJim

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks