General

  • Target

    Best.exe

  • Size

    2.6MB

  • Sample

    250222-y2mxfsxkdw

  • MD5

    ffbd4856b9514f0db9d1f06f51060dd2

  • SHA1

    86a0418a6672754326fe146e68b2db56eae01710

  • SHA256

    be51fb720bcc14fbce1a3360295390290d99921216acc8979fd64e85fa5afff0

  • SHA512

    dc66c8607aec4390f882e796ed8936038cd9db230cf9ce2c5c9779c225b427afe56a593a7c7c0a96657e9d12da1f79da48f3b2ea4c2ee052f1e213bc61b6144a

  • SSDEEP

    49152:PVxkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+PT:9E+YplNwGyNm3Z/x0wCX

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1342855344006893599/eGKFdFfxqqBAzE_z6yEX9OgSrXGjaARgvdEHtEpFWiqqlvMfgcnXVTQiOS26Pz1o69fo

Targets

    • Target

      Best.exe

    • Size

      2.6MB

    • MD5

      ffbd4856b9514f0db9d1f06f51060dd2

    • SHA1

      86a0418a6672754326fe146e68b2db56eae01710

    • SHA256

      be51fb720bcc14fbce1a3360295390290d99921216acc8979fd64e85fa5afff0

    • SHA512

      dc66c8607aec4390f882e796ed8936038cd9db230cf9ce2c5c9779c225b427afe56a593a7c7c0a96657e9d12da1f79da48f3b2ea4c2ee052f1e213bc61b6144a

    • SSDEEP

      49152:PVxkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+PT:9E+YplNwGyNm3Z/x0wCX

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks