General

  • Target

    VSMA2biL

  • Size

    2KB

  • Sample

    230628-1gkygacb2x

  • MD5

    d4822f078c08991bc098f36191dac13d

  • SHA1

    81d75fc6905baac0e8960fd7175b96eb37d8a601

  • SHA256

    3f9f090495745e9e0dab12b90f3f327c4b440ed528a12bf2ad9d9e28f75492f6

  • SHA512

    d7edab496d56c9ec7ced99f591d54aacbe30c2bb7fdf41ebe877291de0e3d318a1dabe2f72a66a5a51ccfb479ed527576ad4848984d67423f561f0b764d9cb2b

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1123698267734147092/H6VI6Ltd6c0H1neojvhDANzOgzs4lvN4697yRGsnC0bfPHO4TrnYRwot3r_kMRfc7-jX

Targets

    • Target

      VSMA2biL

    • Size

      2KB

    • MD5

      d4822f078c08991bc098f36191dac13d

    • SHA1

      81d75fc6905baac0e8960fd7175b96eb37d8a601

    • SHA256

      3f9f090495745e9e0dab12b90f3f327c4b440ed528a12bf2ad9d9e28f75492f6

    • SHA512

      d7edab496d56c9ec7ced99f591d54aacbe30c2bb7fdf41ebe877291de0e3d318a1dabe2f72a66a5a51ccfb479ed527576ad4848984d67423f561f0b764d9cb2b

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks