General

  • Target

    DeltaCrack.exe

  • Size

    259KB

  • Sample

    250412-mk1w7sszav

  • MD5

    31ad590c8b916b8fd2940c88cb4ec5e1

  • SHA1

    b4fefbb7baf5e5f62fa7cddd7ac1cf2e02e57aca

  • SHA256

    9aef7a2f101a0ee9126a42195cd4d646aa8af678efea884617c67f1d4ba38ac0

  • SHA512

    ec23dc58cf781962cfc07c373a4c4b02bd3a620f1557c8c2901dc26917876f30aba73b765c4ced6bf24f8714a21221804928d7b85d5dbb22652baf1072a19ffc

  • SSDEEP

    6144:RlloZMHrIkd8g+EtXHkv/iD4cOICli8e1mhOj+iW:poZIL+EP8b6BjzW

Malware Config

Targets

    • Target

      DeltaCrack.exe

    • Size

      259KB

    • MD5

      31ad590c8b916b8fd2940c88cb4ec5e1

    • SHA1

      b4fefbb7baf5e5f62fa7cddd7ac1cf2e02e57aca

    • SHA256

      9aef7a2f101a0ee9126a42195cd4d646aa8af678efea884617c67f1d4ba38ac0

    • SHA512

      ec23dc58cf781962cfc07c373a4c4b02bd3a620f1557c8c2901dc26917876f30aba73b765c4ced6bf24f8714a21221804928d7b85d5dbb22652baf1072a19ffc

    • SSDEEP

      6144:RlloZMHrIkd8g+EtXHkv/iD4cOICli8e1mhOj+iW:poZIL+EP8b6BjzW

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks