General

  • Target

    1235.exe

  • Size

    228KB

  • Sample

    250207-wrmgtsspfn

  • MD5

    82a22b60e4a5e4077b18fba2ee9b8f68

  • SHA1

    83e24baf92b4aa460cddc4314565b551f7a066a8

  • SHA256

    b0f79191d92362d4360f008da24196a5f36f2afa311180f6140e979242af4760

  • SHA512

    6d7d0805dcd04f2498a65e2948aa6a67e775a1ba21f34dfec1e0bb231d52a571641fbdbc4fafb35393fb942013c708a5a090394d87a564d42ae941a18fe489c9

  • SSDEEP

    6144:BloZM9rIkd8g+EtXHkv/iD4ycCNKInDA+ZMK7bC+Zb8e1m1i:zoZOL+EP8ycCNKInDA+ZMK7bCGj

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1337483595132178554/VqRReIUsmaQ6Yfp34ws4Kz6LBFw4bro10KY-ATA5gP2h7JtTqj6roRaLkntlLw91KcFf

Targets

    • Target

      1235.exe

    • Size

      228KB

    • MD5

      82a22b60e4a5e4077b18fba2ee9b8f68

    • SHA1

      83e24baf92b4aa460cddc4314565b551f7a066a8

    • SHA256

      b0f79191d92362d4360f008da24196a5f36f2afa311180f6140e979242af4760

    • SHA512

      6d7d0805dcd04f2498a65e2948aa6a67e775a1ba21f34dfec1e0bb231d52a571641fbdbc4fafb35393fb942013c708a5a090394d87a564d42ae941a18fe489c9

    • SSDEEP

      6144:BloZM9rIkd8g+EtXHkv/iD4ycCNKInDA+ZMK7bC+Zb8e1m1i:zoZOL+EP8ycCNKInDA+ZMK7bCGj

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks