General

  • Target

    Xeno.exe

  • Size

    227KB

  • Sample

    250222-2vnf7aspt5

  • MD5

    6b880150debb9697c8bc4ef9c88d2767

  • SHA1

    157f06eb7ff46e3586f186b265d14a816f3fd2d1

  • SHA256

    21fd303a6f0cdccb2d6e349317b6e464ccb514f9cd5a2ee3c1d191c801ff0b46

  • SHA512

    93acc76719154217a0b04d19964a2c5fded5b4e12eb052fef28654e2d1b01f24e4284c9851c8038cbeb3e939128a3913c8954b015fce67ff89772d26ddf014ce

  • SSDEEP

    6144:+loZM9rIkd8g+EtXHkv/iD4+ZZjjpaC9bop7mGzsmXb8e1mbri:ooZOL+EP8+ZZjjpaC9bop7mGzbJ

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1342920471783542836/OunFkHC0-8AiK-lZk7zc5-fESw0GXU2reuQ4CmW1TFKgzgl278EgDA8pAWf5KUaOGK7g

Targets

    • Target

      Xeno.exe

    • Size

      227KB

    • MD5

      6b880150debb9697c8bc4ef9c88d2767

    • SHA1

      157f06eb7ff46e3586f186b265d14a816f3fd2d1

    • SHA256

      21fd303a6f0cdccb2d6e349317b6e464ccb514f9cd5a2ee3c1d191c801ff0b46

    • SHA512

      93acc76719154217a0b04d19964a2c5fded5b4e12eb052fef28654e2d1b01f24e4284c9851c8038cbeb3e939128a3913c8954b015fce67ff89772d26ddf014ce

    • SSDEEP

      6144:+loZM9rIkd8g+EtXHkv/iD4+ZZjjpaC9bop7mGzsmXb8e1mbri:ooZOL+EP8+ZZjjpaC9bop7mGzbJ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks