General
-
Target
Umbral1.exe
-
Size
221KB
-
Sample
250211-qt7mwstqhs
-
MD5
fe655b03add462121d67240f461e8787
-
SHA1
73907706fdf7922ba19a27f4b1fd315f7c107efe
-
SHA256
dccdba44701fbf3031e6a2ad016cb702c7941ca2abbc754ba60b1d0ca5396e82
-
SHA512
c00653793e37dee5b4bdc5cbd0194038928e03dfb8a3e8910c54d8c20133e163c59c36fb6989c180c3fb9e39e9a37d3544292f55fd92367749e7fa143c4c8b7b
-
SSDEEP
6144:KloZMUrIkd8g+EtXHkv/iD439sJNlK8euYi:0oZrL+EP8Na
Behavioral task
behavioral1
Sample
Umbral1.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1338864679413612690/az7gaYeiU1_nRKVRHkmFzjNO2o2mDOiEqjxYZZ60NRhP6I8SyvMa2cmFPyYkFBXYOt8R
Targets
-
-
Target
Umbral1.exe
-
Size
221KB
-
MD5
fe655b03add462121d67240f461e8787
-
SHA1
73907706fdf7922ba19a27f4b1fd315f7c107efe
-
SHA256
dccdba44701fbf3031e6a2ad016cb702c7941ca2abbc754ba60b1d0ca5396e82
-
SHA512
c00653793e37dee5b4bdc5cbd0194038928e03dfb8a3e8910c54d8c20133e163c59c36fb6989c180c3fb9e39e9a37d3544292f55fd92367749e7fa143c4c8b7b
-
SSDEEP
6144:KloZMUrIkd8g+EtXHkv/iD439sJNlK8euYi:0oZrL+EP8Na
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1