General

  • Target

    Umbral1.exe

  • Size

    221KB

  • Sample

    250211-qt7mwstqhs

  • MD5

    fe655b03add462121d67240f461e8787

  • SHA1

    73907706fdf7922ba19a27f4b1fd315f7c107efe

  • SHA256

    dccdba44701fbf3031e6a2ad016cb702c7941ca2abbc754ba60b1d0ca5396e82

  • SHA512

    c00653793e37dee5b4bdc5cbd0194038928e03dfb8a3e8910c54d8c20133e163c59c36fb6989c180c3fb9e39e9a37d3544292f55fd92367749e7fa143c4c8b7b

  • SSDEEP

    6144:KloZMUrIkd8g+EtXHkv/iD439sJNlK8euYi:0oZrL+EP8Na

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1338864679413612690/az7gaYeiU1_nRKVRHkmFzjNO2o2mDOiEqjxYZZ60NRhP6I8SyvMa2cmFPyYkFBXYOt8R

Targets

    • Target

      Umbral1.exe

    • Size

      221KB

    • MD5

      fe655b03add462121d67240f461e8787

    • SHA1

      73907706fdf7922ba19a27f4b1fd315f7c107efe

    • SHA256

      dccdba44701fbf3031e6a2ad016cb702c7941ca2abbc754ba60b1d0ca5396e82

    • SHA512

      c00653793e37dee5b4bdc5cbd0194038928e03dfb8a3e8910c54d8c20133e163c59c36fb6989c180c3fb9e39e9a37d3544292f55fd92367749e7fa143c4c8b7b

    • SSDEEP

      6144:KloZMUrIkd8g+EtXHkv/iD439sJNlK8euYi:0oZrL+EP8Na

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks