General

  • Target

    Voxiom.io Loader.zip

  • Size

    141KB

  • Sample

    231002-26k57sgh79

  • MD5

    ef56f0e19e96b9da01ca5f463d0806ec

  • SHA1

    dc5facbdf1ba40a99c7f1e7776a33c05c6598316

  • SHA256

    fdaf5bca3b3bad4071595db5558a1c2e927e7c6e822030d37f13a861adfee77d

  • SHA512

    d4bc28261edb09b0aa558a1eba3961193076c42d4ff7aadc545847366b6a6617275b30118303e0f9acc5e4d6289836d96c43dd0c3f1bb649cbfe4d6406805ad4

  • SSDEEP

    3072:ctE1syfrh2/9CRZiuTwRGjLEcYEUkaEt/pGaghfRNJHcRzhl/:cilIVCLylk9/4agh1HcR9p

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1158524014961111142/-VPn4v1yBepEWZwAJNhu7Jx3WfJFd5I-E4UpnmpC1VZOOQa7-MmG4YDnlX0EK-pxyOKf

Targets

    • Target

      Voxiom.io Loader.exe

    • Size

      279KB

    • MD5

      c697c89b329c3d9061aa0ac730aa9d97

    • SHA1

      7da83b25b7eb028c4b624a14e46b129735e7caf7

    • SHA256

      d290b7546f6f9df3320d4b2421a42aaa8e45792be5f4865f17df2d0844ae97ec

    • SHA512

      fbe7976ded8a7e7919158f54a0b03dfddf83afc210e5b0958afb0cab5ccaee64d886b2d67f396a5d67526684ba176da4239bf1b95d891322e2c80114a52d80d8

    • SSDEEP

      6144:oloZM+rIkd8g+EtXHkv/iD4WFHHQ2U7X8ktoGnnGm4b8e1mkix4aghFHcR9:2oZtL+EP8+HHQ2U7X8ktoGnnGnS+ag/

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks