General

  • Target

    BootstrapperNew.exe

  • Size

    2.5MB

  • Sample

    250223-1l79kaxpt4

  • MD5

    34d432e798ab3b52bc4af41be6f1d014

  • SHA1

    2bb6fbd86e63c40f088ed77a27be6402be96d7ce

  • SHA256

    dc5abd691589fe6086d88e1a673c0194315d9862e23d04c33b53c98f16f5940c

  • SHA512

    66073c887bcec7fcfd73a12b8ea1a4bda88672f40fa47f41beac0ecb7724940a5c72fcff64ab4dd56788d38b2b16f2923468e4bd9c01b4e72757fffa0ca74bce

  • SSDEEP

    49152:txkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+Pt7Ld:tE+YplNwGyNm3Z/x0wCXq

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1343311120542203995/vhngKTCVfZJyDIS1ApzUQsvaS_ZaYsL3rmqMhHnf1lLMcgKd60j4i11JkQ1NYiPLtW5J

Targets

    • Target

      BootstrapperNew.exe

    • Size

      2.5MB

    • MD5

      34d432e798ab3b52bc4af41be6f1d014

    • SHA1

      2bb6fbd86e63c40f088ed77a27be6402be96d7ce

    • SHA256

      dc5abd691589fe6086d88e1a673c0194315d9862e23d04c33b53c98f16f5940c

    • SHA512

      66073c887bcec7fcfd73a12b8ea1a4bda88672f40fa47f41beac0ecb7724940a5c72fcff64ab4dd56788d38b2b16f2923468e4bd9c01b4e72757fffa0ca74bce

    • SSDEEP

      49152:txkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+Pt7Ld:tE+YplNwGyNm3Z/x0wCXq

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks