General
-
Target
Umbral.exe
-
Size
227KB
-
Sample
231120-yv3dkaag9y
-
MD5
7e9faed032d384d5b0e472edc0f3ef20
-
SHA1
3a5ee16bbd96b209b763769ae984025d2c9212ca
-
SHA256
04da8c2eabf58cfad930f0e8b70cf9158cbcf17b0544cfb4313a71f805122ec5
-
SHA512
5a7145c434fb63b98b46533190c89d8779d0818b35ac681f2cc1471841267256fbcce1c92ab467f7a2d1aa17aa8507bec698ef87115e0825b7a37f75eeec16de
-
SSDEEP
6144:+loZMCrIkd8g+EtXHkv/iD43I/njpaC9vop7mGzJrwb8e1mBi:ooZZL+EP83I/njpaC9vop7mGzh4z
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1176252138050035753/gheqRjUXIc9e4b_sHscIFiZj7jG0ou-TFoc_JordCTCpn4dkh6_-Q0QnV9EVX_jysDfz
Targets
-
-
Target
Umbral.exe
-
Size
227KB
-
MD5
7e9faed032d384d5b0e472edc0f3ef20
-
SHA1
3a5ee16bbd96b209b763769ae984025d2c9212ca
-
SHA256
04da8c2eabf58cfad930f0e8b70cf9158cbcf17b0544cfb4313a71f805122ec5
-
SHA512
5a7145c434fb63b98b46533190c89d8779d0818b35ac681f2cc1471841267256fbcce1c92ab467f7a2d1aa17aa8507bec698ef87115e0825b7a37f75eeec16de
-
SSDEEP
6144:+loZMCrIkd8g+EtXHkv/iD43I/njpaC9vop7mGzJrwb8e1mBi:ooZZL+EP83I/njpaC9vop7mGzh4z
-
Detect Umbral payload
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-