General

  • Target

    FFH4X CRACK.exe

  • Size

    229KB

  • Sample

    250414-lr1z4swtdt

  • MD5

    06d16f85b86a25e8bcc3cd54891f3fd7

  • SHA1

    a86eea204adfe0a1f62e02c3913c64f5a9ae9d02

  • SHA256

    ba9c10926b5db69c9ebaac2c7b9f45536c8db55627268b71f9c813e1f8990e17

  • SHA512

    e8780bced5ab07f7ba6bec5580af43333294252b149b226ce53aada7d85962a96f28430eda174bcb04cc5f08b217ca62e32749848739377d671e318191570224

  • SSDEEP

    6144:tloZM+rIkd8g+EtXHkv/iD4AJ7quMzvEMlwOffuQeb8e1mhi:voZtL+EP8AJ7quMzvEMlwOffur/

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1359972662327119973/YJW3_8bZfzzr2nKVpfi4s_gEkxAMuJPysqnfGaIm9hrZ8C0UxMS2pyTCdmwNbNoncZd7

Targets

    • Target

      FFH4X CRACK.exe

    • Size

      229KB

    • MD5

      06d16f85b86a25e8bcc3cd54891f3fd7

    • SHA1

      a86eea204adfe0a1f62e02c3913c64f5a9ae9d02

    • SHA256

      ba9c10926b5db69c9ebaac2c7b9f45536c8db55627268b71f9c813e1f8990e17

    • SHA512

      e8780bced5ab07f7ba6bec5580af43333294252b149b226ce53aada7d85962a96f28430eda174bcb04cc5f08b217ca62e32749848739377d671e318191570224

    • SSDEEP

      6144:tloZM+rIkd8g+EtXHkv/iD4AJ7quMzvEMlwOffuQeb8e1mhi:voZtL+EP8AJ7quMzvEMlwOffur/

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks