General

  • Target

    2025-03-25_97b25ff717bbbec7863bab2e6a7cf1cb_darkgate_ngrbot_ransomlock

  • Size

    973KB

  • Sample

    250325-j1982awqy8

  • MD5

    97b25ff717bbbec7863bab2e6a7cf1cb

  • SHA1

    45577be5cff8877bdfecaa3e53c9d4f87800a60c

  • SHA256

    a73097a2473040ef00430e3bf37e00253d2a92e83ffa91fd8439d20e22760c6c

  • SHA512

    b1b855185741999e2fb0071d305873f5b21bf6e82e43770cea897d6376602180ecd7691584bf726fdb5b3db1b7b5f2c120566b32cd6d395e9b9b6c0ef7ac51b2

  • SSDEEP

    24576:N5r3iOAYe5xyrXKYZd8nixN/pSUCpM2W1GvgmyeRvJ:ui5xC61GyovJ

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1347583822056919130/yX79NUSPBNVr2tsX_XmaynqYqcY3gmEhP7obSFH8YBkvqiBeVsotOhGyBsTVYUbz_ykp

Targets

    • Target

      2025-03-25_97b25ff717bbbec7863bab2e6a7cf1cb_darkgate_ngrbot_ransomlock

    • Size

      973KB

    • MD5

      97b25ff717bbbec7863bab2e6a7cf1cb

    • SHA1

      45577be5cff8877bdfecaa3e53c9d4f87800a60c

    • SHA256

      a73097a2473040ef00430e3bf37e00253d2a92e83ffa91fd8439d20e22760c6c

    • SHA512

      b1b855185741999e2fb0071d305873f5b21bf6e82e43770cea897d6376602180ecd7691584bf726fdb5b3db1b7b5f2c120566b32cd6d395e9b9b6c0ef7ac51b2

    • SSDEEP

      24576:N5r3iOAYe5xyrXKYZd8nixN/pSUCpM2W1GvgmyeRvJ:ui5xC61GyovJ

    • Detect Umbral payload

    • Modifies WinLogon for persistence

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks