General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    250411-me81mawvgv

  • MD5

    dcd9253fa3b14afa8d8e636315517897

  • SHA1

    37fcf6a0b4b67e99ad6b4e2c51f0fab9f0874052

  • SHA256

    83fa6a1e67c9ecd7ec68e905c4474274340b96b718da2dbab29cc7fcc4c3e414

  • SHA512

    6cdc1cb0795a2ce33c377141b643b969da1ac7b9708a348115cfe89522f605c99b2f8c3f5cbe08059af0fae1e1a44e9cf05728de7fc50aeb8a78d813e7d80758

  • SSDEEP

    6144:FloZMNrIkd8g+EtXHkv/iD42ZdOecfVeGJeMFXSy3sLb8e1mPwi:HoZmL+EP8EdOecfVeGJeMFXSy3+i

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1359970812253311018/zRLC6mLNUMn_2woo-dOFtgdF3pX26vXXypDT8injvHCd0rUGeHfrx8qiBW3dThiGJXSN

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      dcd9253fa3b14afa8d8e636315517897

    • SHA1

      37fcf6a0b4b67e99ad6b4e2c51f0fab9f0874052

    • SHA256

      83fa6a1e67c9ecd7ec68e905c4474274340b96b718da2dbab29cc7fcc4c3e414

    • SHA512

      6cdc1cb0795a2ce33c377141b643b969da1ac7b9708a348115cfe89522f605c99b2f8c3f5cbe08059af0fae1e1a44e9cf05728de7fc50aeb8a78d813e7d80758

    • SSDEEP

      6144:FloZMNrIkd8g+EtXHkv/iD42ZdOecfVeGJeMFXSy3sLb8e1mPwi:HoZmL+EP8EdOecfVeGJeMFXSy3+i

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks