General

  • Target

    Umbral.exe

  • Size

    227KB

  • Sample

    250211-qqxzaatnfv

  • MD5

    6131d796eecfeb08a137a4f49f256313

  • SHA1

    02a9e0194002771101f0b238efc3e693b7a60e5a

  • SHA256

    d88d07958c691702589bfb9d7d0caf297ce70c4fd46c353a831238e97134017c

  • SHA512

    66bf2e65b633a4b4b82c6b262d2e8e3fec1f05f35afd25c0dcf8352abd4e6a1a4dcaf064012820a9480369a66c0c1682de5dcfab0887fb22ce9263c064dfb868

  • SSDEEP

    6144:eloZMUrIkd8g+EtXHkv/iD4YfwyqoHjgC5sqb7iawb8e1mGi:IoZrL+EP8YfwyqoHjgC5sqb7iTQ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1338863890938990746/GmHF9DCMXNgQTczflY-4bFZ6xyjBVBkXugEYMlJP1HYnYH2nQnRfm2Xnn5qF-Dq86Sdk

Targets

    • Target

      Umbral.exe

    • Size

      227KB

    • MD5

      6131d796eecfeb08a137a4f49f256313

    • SHA1

      02a9e0194002771101f0b238efc3e693b7a60e5a

    • SHA256

      d88d07958c691702589bfb9d7d0caf297ce70c4fd46c353a831238e97134017c

    • SHA512

      66bf2e65b633a4b4b82c6b262d2e8e3fec1f05f35afd25c0dcf8352abd4e6a1a4dcaf064012820a9480369a66c0c1682de5dcfab0887fb22ce9263c064dfb868

    • SSDEEP

      6144:eloZMUrIkd8g+EtXHkv/iD4YfwyqoHjgC5sqb7iawb8e1mGi:IoZrL+EP8YfwyqoHjgC5sqb7iTQ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks