General
-
Target
Umbral Builder 2.0.exe
-
Size
296KB
-
Sample
231104-mgz6haaa32
-
MD5
0c1911851b28c7c2c475ec85c6762b3d
-
SHA1
1b62107460f6225073fa3d69d85530dd6013ca69
-
SHA256
ee31a42c43a6b47c76535cca780ff3282bea54012105d5c8f1e008ee9d97da82
-
SHA512
3da12248d95f04ed389faa3bdea994fef22bda6c4c821520cc580eca81b089cf9bcfea01757f12a30e495bc51716b7cf72ac2d7ae22352dc771bdf8a0fb6b9a0
-
SSDEEP
6144:dloZMCrIkd8g+EtXHkv/iD4dokdrR/k4XcG/BcoNkbb8e1msOi:/oZZL+EP8dokdrR/k4XcG/BcoNClj
Behavioral task
behavioral1
Sample
Umbral Builder 2.0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Umbral Builder 2.0.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1169732066284413018/hM3YmpavQiD8NODs7eJAiYARP7hVGro0MlH1lnpFMejmhsKXbjcQ1SiOrusfEkeIaXZC
Targets
-
-
Target
Umbral Builder 2.0.exe
-
Size
296KB
-
MD5
0c1911851b28c7c2c475ec85c6762b3d
-
SHA1
1b62107460f6225073fa3d69d85530dd6013ca69
-
SHA256
ee31a42c43a6b47c76535cca780ff3282bea54012105d5c8f1e008ee9d97da82
-
SHA512
3da12248d95f04ed389faa3bdea994fef22bda6c4c821520cc580eca81b089cf9bcfea01757f12a30e495bc51716b7cf72ac2d7ae22352dc771bdf8a0fb6b9a0
-
SSDEEP
6144:dloZMCrIkd8g+EtXHkv/iD4dokdrR/k4XcG/BcoNkbb8e1msOi:/oZZL+EP8dokdrR/k4XcG/BcoNClj
-
Detect Umbral payload
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-