General

  • Target

    2q34t.exe

  • Size

    229KB

  • Sample

    250207-wz35jstjer

  • MD5

    44b03260c9647ac9b97f4a0fa574c0cb

  • SHA1

    a1685e9e04f1e5b97930cc605804a6db09160cc3

  • SHA256

    b6e55b54786ec2881d6b799c0ec46957c8fa6ab6bbb72dc3224c7842e75096bb

  • SHA512

    4c1f009003fcad70e6cdaa85ad527820428807c577ea65ea56b559222ab5d40d7a4984b2ac2eae1925b4168b30c12610bceb6fab0e5783126f0572c0b929038a

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4JGafVeGJ/MFXSy3AfptLBL8e1m+i:noZ1L+EP8JGafVeGJ/MFXSy3QTLxE

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1337488559015198862/07jaIpvm6kJlzZ8F2bmVt1OhTsZeAQ0NEKk-5HwzLig0lZCRcJwvZ5YekGqwBCkb3ZTU

Targets

    • Target

      2q34t.exe

    • Size

      229KB

    • MD5

      44b03260c9647ac9b97f4a0fa574c0cb

    • SHA1

      a1685e9e04f1e5b97930cc605804a6db09160cc3

    • SHA256

      b6e55b54786ec2881d6b799c0ec46957c8fa6ab6bbb72dc3224c7842e75096bb

    • SHA512

      4c1f009003fcad70e6cdaa85ad527820428807c577ea65ea56b559222ab5d40d7a4984b2ac2eae1925b4168b30c12610bceb6fab0e5783126f0572c0b929038a

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4JGafVeGJ/MFXSy3AfptLBL8e1m+i:noZ1L+EP8JGafVeGJ/MFXSy3QTLxE

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks