General

  • Target

    NEAS.Syncronized20exe_JC.exe

  • Size

    378KB

  • Sample

    231008-tjlt8agc77

  • MD5

    f722fd75ed010251ca9ea71a34c480f0

  • SHA1

    7e2edd16c5f0f25afb209cd9667421ee5c57ebb9

  • SHA256

    818603cc9f08d52c05d296d894d22b8b922e43d07e5181fe2f812866cb72955c

  • SHA512

    4c4c52297215984170b516c26e97cb5132ab9f95449449cd3c99a53cd1039e4f8c51692a32768321da3bdf6da4ee8b55bb7a0f44346d11a69750094c990d34cb

  • SSDEEP

    6144:FloZM+rIkd8g+EtXHkv/iD4eE/KrVOsTPkyFQu//OoEb8e1mOQC6i:HoZtL+EP89/KrVOsTPkyFQu//Ohn/

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1094511928434495510/JNDt7-fWdRmhOMo5ZrRgpQLw_b3iWl9O5xAnjZdGBWCOdm3tpWvm15cnMLyKfaNhA3hz

Targets

    • Target

      NEAS.Syncronized20exe_JC.exe

    • Size

      378KB

    • MD5

      f722fd75ed010251ca9ea71a34c480f0

    • SHA1

      7e2edd16c5f0f25afb209cd9667421ee5c57ebb9

    • SHA256

      818603cc9f08d52c05d296d894d22b8b922e43d07e5181fe2f812866cb72955c

    • SHA512

      4c4c52297215984170b516c26e97cb5132ab9f95449449cd3c99a53cd1039e4f8c51692a32768321da3bdf6da4ee8b55bb7a0f44346d11a69750094c990d34cb

    • SSDEEP

      6144:FloZM+rIkd8g+EtXHkv/iD4eE/KrVOsTPkyFQu//OoEb8e1mOQC6i:HoZtL+EP89/KrVOsTPkyFQu//Ohn/

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks