General

  • Target

    NEAS.e8dc6836af5afe2632a7ae54ad535110_JC.exe

  • Size

    227KB

  • Sample

    231105-a6dycaah47

  • MD5

    e8dc6836af5afe2632a7ae54ad535110

  • SHA1

    c10649f60077387b0712e590ec913354fa73258e

  • SHA256

    596381f20e3acd0ace416366333b3614d003d8119a77769e183cab2e9990fd53

  • SHA512

    40d9ea7bde3f6bc763ecb385be25adc2a297208562cd77bf862fb54cd97e5e061c927c989a0f0e8795182fcfb1a83240ed22fc1988e2d01ee1dea66fc3235891

  • SSDEEP

    6144:MloZMNrIkd8g+EtXHkv/iD4FdV+mkrHMc9YW3X2lAb8e1mMbi:KoZ+L+EP8FdV+mkrHMc9YW3X2ef2

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1165896230807806014/v7p5hDxxKGk6W3-qSP0EC531GKTmo-zJvE0Y_aKaraPWytxWR3zEjYL5gqFyhycImJdz

Targets

    • Target

      NEAS.e8dc6836af5afe2632a7ae54ad535110_JC.exe

    • Size

      227KB

    • MD5

      e8dc6836af5afe2632a7ae54ad535110

    • SHA1

      c10649f60077387b0712e590ec913354fa73258e

    • SHA256

      596381f20e3acd0ace416366333b3614d003d8119a77769e183cab2e9990fd53

    • SHA512

      40d9ea7bde3f6bc763ecb385be25adc2a297208562cd77bf862fb54cd97e5e061c927c989a0f0e8795182fcfb1a83240ed22fc1988e2d01ee1dea66fc3235891

    • SSDEEP

      6144:MloZMNrIkd8g+EtXHkv/iD4FdV+mkrHMc9YW3X2lAb8e1mMbi:KoZ+L+EP8FdV+mkrHMc9YW3X2ef2

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks