General

  • Target

    Nemezida.exe

  • Size

    231KB

  • Sample

    250411-w7zgbsxsev

  • MD5

    18bc878dd9de70a6e96dc283aaa986bd

  • SHA1

    cfaeee2d1e1f02690568ffa22d1be955cc318808

  • SHA256

    e8cba28d07b08b7267d7430bb1beea11634d76d549f2056e362b14871f645c66

  • SHA512

    af3040a2e2da1330b6821bb0cc59962a60095d1c7af5854e9c409225ce032946dfaee6a3bd35cfc3b584315398801e5ccc0601b3e0fdb49216f6e35f28888c23

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD4cZO/GELnsGd42X3WfEb8e1mpi:DoZtL+EP8cZO/GELnsGd42X3W8b

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1360276909551915029/lC-vw7kRiqutkehNUDibMCgd2Hd6PFiq86JSv2ugXDPC7_FGRYRy6t4EL1s_Fy6LAyD6

Targets

    • Target

      Nemezida.exe

    • Size

      231KB

    • MD5

      18bc878dd9de70a6e96dc283aaa986bd

    • SHA1

      cfaeee2d1e1f02690568ffa22d1be955cc318808

    • SHA256

      e8cba28d07b08b7267d7430bb1beea11634d76d549f2056e362b14871f645c66

    • SHA512

      af3040a2e2da1330b6821bb0cc59962a60095d1c7af5854e9c409225ce032946dfaee6a3bd35cfc3b584315398801e5ccc0601b3e0fdb49216f6e35f28888c23

    • SSDEEP

      6144:xloZM+rIkd8g+EtXHkv/iD4cZO/GELnsGd42X3WfEb8e1mpi:DoZtL+EP8cZO/GELnsGd42X3W8b

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks