General

  • Target

    Imperial.Stealer.exe

  • Size

    287KB

  • Sample

    230707-abq97aeg82

  • MD5

    f0a434e6a2826a3bb563c59dfe720a94

  • SHA1

    46899f6dda27a9ddc7f0849f999a7d7851f6960c

  • SHA256

    0082170e2185d53ec008632a7e8d10b6ff831c063dd2fbf23b6a888f21e6da29

  • SHA512

    14fd13968cbc005764e43bfc62056c953a3c61c94f90888b9a3c26d3c0b1b8645335e7c950ad05787bd75423c5a2d310baf08dc41ed6aef99f773cab76f694e4

  • SSDEEP

    6144:+loZM+rIkd8g+EtXHkv/iD4U8OK/w2xpaqPyAxVk1Eb8e1mwi:ooZtL+EP8U8OK/w2xpaqPyAxVkOG

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1125959139969994822/tjr2Z1YnGve0qXnwycv9Zn-50F_cWvKxydzIRLCfjpEqRL1feAQxWnrH1tg6T4YplSIy

Targets

    • Target

      Imperial.Stealer.exe

    • Size

      287KB

    • MD5

      f0a434e6a2826a3bb563c59dfe720a94

    • SHA1

      46899f6dda27a9ddc7f0849f999a7d7851f6960c

    • SHA256

      0082170e2185d53ec008632a7e8d10b6ff831c063dd2fbf23b6a888f21e6da29

    • SHA512

      14fd13968cbc005764e43bfc62056c953a3c61c94f90888b9a3c26d3c0b1b8645335e7c950ad05787bd75423c5a2d310baf08dc41ed6aef99f773cab76f694e4

    • SSDEEP

      6144:+loZM+rIkd8g+EtXHkv/iD4U8OK/w2xpaqPyAxVk1Eb8e1mwi:ooZtL+EP8U8OK/w2xpaqPyAxVkOG

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.