General

  • Target

    dx9injector.exe

  • Size

    632KB

  • Sample

    231013-b1gygshd61

  • MD5

    d69d90a0ac5890b22e0932e7a24ba9c2

  • SHA1

    d303ab6a4cf6e7ab113a60e2392a8ae42b455c07

  • SHA256

    96ac460a603a209e2c8167613b292181f7f2f5ede977258a096f7d2c4f1e3870

  • SHA512

    ec4804d65edf28de02d9889f83e37c0262da3e875a2707050213799662676f5ac9824b388f15f38312d6b303276b7a8a9cb3803e655087dce0f1d336b89bc7c8

  • SSDEEP

    6144:XloZMLrIkd8g+EtXHkv/iD4PNWNvFuW558VHCCHTib8e1mKivanvOG2NYg7Cn+A7:1oZ0L+EP8PNWNvFuW558VHCCHy4LDA7

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1124332723931185242/OmV2GIsC1NUjLtGwP4q_EQTwB9SgZaU961Sl1T1h_56IhSYPJ0nSgKpGlbCRx1G1yqfn

Targets

    • Target

      dx9injector.exe

    • Size

      632KB

    • MD5

      d69d90a0ac5890b22e0932e7a24ba9c2

    • SHA1

      d303ab6a4cf6e7ab113a60e2392a8ae42b455c07

    • SHA256

      96ac460a603a209e2c8167613b292181f7f2f5ede977258a096f7d2c4f1e3870

    • SHA512

      ec4804d65edf28de02d9889f83e37c0262da3e875a2707050213799662676f5ac9824b388f15f38312d6b303276b7a8a9cb3803e655087dce0f1d336b89bc7c8

    • SSDEEP

      6144:XloZMLrIkd8g+EtXHkv/iD4PNWNvFuW558VHCCHTib8e1mKivanvOG2NYg7Cn+A7:1oZ0L+EP8PNWNvFuW558VHCCHy4LDA7

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks