General

  • Target

    RobloxUpdate.exe

  • Size

    231KB

  • Sample

    230911-vedhqahb8y

  • MD5

    e888706c3bb06f4ca5ee2476c4669a32

  • SHA1

    e8caccdcd618f82a4eae6aca13ed308391f58cde

  • SHA256

    f68e296a7e54e54985e8748b9b5308dbf92cca51c602fedddeb25759eb88c72a

  • SHA512

    1809ce5a99059b107cd15fe9ad82c986b904965460edfaa57d1ca6e542f0d0cf63ee95e26a5473c9f9fd9105f0c97105230ee6e62ff01193ee828f821f7bb79b

  • SSDEEP

    6144:RloZM9rIkd8g+EtXHkv/iD4LzazJ16aB8e1mPi:joZOL+EP8LzazJ9Z

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1150835675596333117/o-JcAkkZgW95Q4k_Ci9OvJOZ6J11KjhlCP6vR_0yruo3pNrw3PlpA2F1Jggqgax_hraX

Targets

    • Target

      RobloxUpdate.exe

    • Size

      231KB

    • MD5

      e888706c3bb06f4ca5ee2476c4669a32

    • SHA1

      e8caccdcd618f82a4eae6aca13ed308391f58cde

    • SHA256

      f68e296a7e54e54985e8748b9b5308dbf92cca51c602fedddeb25759eb88c72a

    • SHA512

      1809ce5a99059b107cd15fe9ad82c986b904965460edfaa57d1ca6e542f0d0cf63ee95e26a5473c9f9fd9105f0c97105230ee6e62ff01193ee828f821f7bb79b

    • SSDEEP

      6144:RloZM9rIkd8g+EtXHkv/iD4LzazJ16aB8e1mPi:joZOL+EP8LzazJ9Z

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks