General

  • Target

    Umbral.exe

  • Size

    227KB

  • Sample

    231120-yv3dkaag9y

  • MD5

    7e9faed032d384d5b0e472edc0f3ef20

  • SHA1

    3a5ee16bbd96b209b763769ae984025d2c9212ca

  • SHA256

    04da8c2eabf58cfad930f0e8b70cf9158cbcf17b0544cfb4313a71f805122ec5

  • SHA512

    5a7145c434fb63b98b46533190c89d8779d0818b35ac681f2cc1471841267256fbcce1c92ab467f7a2d1aa17aa8507bec698ef87115e0825b7a37f75eeec16de

  • SSDEEP

    6144:+loZMCrIkd8g+EtXHkv/iD43I/njpaC9vop7mGzJrwb8e1mBi:ooZZL+EP83I/njpaC9vop7mGzh4z

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1176252138050035753/gheqRjUXIc9e4b_sHscIFiZj7jG0ou-TFoc_JordCTCpn4dkh6_-Q0QnV9EVX_jysDfz

Targets

    • Target

      Umbral.exe

    • Size

      227KB

    • MD5

      7e9faed032d384d5b0e472edc0f3ef20

    • SHA1

      3a5ee16bbd96b209b763769ae984025d2c9212ca

    • SHA256

      04da8c2eabf58cfad930f0e8b70cf9158cbcf17b0544cfb4313a71f805122ec5

    • SHA512

      5a7145c434fb63b98b46533190c89d8779d0818b35ac681f2cc1471841267256fbcce1c92ab467f7a2d1aa17aa8507bec698ef87115e0825b7a37f75eeec16de

    • SSDEEP

      6144:+loZMCrIkd8g+EtXHkv/iD43I/njpaC9vop7mGzJrwb8e1mBi:ooZZL+EP83I/njpaC9vop7mGzh4z

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks