General

  • Target

    Delta Crack.exe

  • Size

    259KB

  • Sample

    250412-mf6lwssp17

  • MD5

    31ad590c8b916b8fd2940c88cb4ec5e1

  • SHA1

    b4fefbb7baf5e5f62fa7cddd7ac1cf2e02e57aca

  • SHA256

    9aef7a2f101a0ee9126a42195cd4d646aa8af678efea884617c67f1d4ba38ac0

  • SHA512

    ec23dc58cf781962cfc07c373a4c4b02bd3a620f1557c8c2901dc26917876f30aba73b765c4ced6bf24f8714a21221804928d7b85d5dbb22652baf1072a19ffc

  • SSDEEP

    6144:RlloZMHrIkd8g+EtXHkv/iD4cOICli8e1mhOj+iW:poZIL+EP8b6BjzW

Malware Config

Targets

    • Target

      Delta Crack.exe

    • Size

      259KB

    • MD5

      31ad590c8b916b8fd2940c88cb4ec5e1

    • SHA1

      b4fefbb7baf5e5f62fa7cddd7ac1cf2e02e57aca

    • SHA256

      9aef7a2f101a0ee9126a42195cd4d646aa8af678efea884617c67f1d4ba38ac0

    • SHA512

      ec23dc58cf781962cfc07c373a4c4b02bd3a620f1557c8c2901dc26917876f30aba73b765c4ced6bf24f8714a21221804928d7b85d5dbb22652baf1072a19ffc

    • SSDEEP

      6144:RlloZMHrIkd8g+EtXHkv/iD4cOICli8e1mhOj+iW:poZIL+EP8b6BjzW

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.