General

  • Target

    Dick.exe

  • Size

    154KB

  • Sample

    250214-zh8kgsymct

  • MD5

    839c119a032699dd494b3dc91251fa77

  • SHA1

    d1323d39fd577d5bf3adb2e093043923b018a8c9

  • SHA256

    f1942d7cf8876e6a8a56db8fabc90082c9798933bdd02e8c07e28ecc80ddb8bb

  • SHA512

    f134f9f8159324d2a6ea82dcef861b4c3f7c218182373297054fb915b084734b923b34081a6b98c4507d79341b8adf76ca0cee1ea20657b686c1252c78cae618

  • SSDEEP

    3072:1ahKyd2n31n5GWp1icKAArDZz4N9GhbkrNEk1lT:1ahO/p0yN90QE6

Malware Config

Targets

    • Target

      Dick.exe

    • Size

      154KB

    • MD5

      839c119a032699dd494b3dc91251fa77

    • SHA1

      d1323d39fd577d5bf3adb2e093043923b018a8c9

    • SHA256

      f1942d7cf8876e6a8a56db8fabc90082c9798933bdd02e8c07e28ecc80ddb8bb

    • SHA512

      f134f9f8159324d2a6ea82dcef861b4c3f7c218182373297054fb915b084734b923b34081a6b98c4507d79341b8adf76ca0cee1ea20657b686c1252c78cae618

    • SSDEEP

      3072:1ahKyd2n31n5GWp1icKAArDZz4N9GhbkrNEk1lT:1ahO/p0yN90QE6

    • Detect Umbral payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks