General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
umbral
C2
https://discord.com/api/webhooks/1114960943219220510/5HQkJAaQ8k16LLJDPfrNPOSWhB6mOuQyVoiVmSfQ92mfYSQoRiYi30V3oB1Cxv1kgZoS
Targets
-
-
Target
https://mega.nz/file/GsNFEZYJ#4018tew4gzM07blU9inSziSpqrs__b15N2wdgiKHZCY
-
Detect Umbral payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-