General

  • Target

    v1.lua.txt

  • Size

    73B

  • Sample

    231126-q3g4lahf91

  • MD5

    788b937bf4db464c2367a0ae621040a5

  • SHA1

    446598049f1fd62e83fe65818c521b307d073f12

  • SHA256

    c156c2a525dedd8626371d6b8808787209c533147d8f515caa44a97bc95b38d8

  • SHA512

    081f0d30ab53ef4689a9cc785ddac0aab330825c7dfbf78d9e187999161dfe26c0dd5eda77070dc3a7e7f1ae5465b6737a297cb843c7043a2a062df4f77b5e80

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1178090943421894717/oiTjFNJzJlZPKQv45vEBY3HwoUJtrV26L9ZwuwlL54qr4SW6mH1ZeHMPKBtP_7sAxEen

Targets

    • Target

      v1.lua.txt

    • Size

      73B

    • MD5

      788b937bf4db464c2367a0ae621040a5

    • SHA1

      446598049f1fd62e83fe65818c521b307d073f12

    • SHA256

      c156c2a525dedd8626371d6b8808787209c533147d8f515caa44a97bc95b38d8

    • SHA512

      081f0d30ab53ef4689a9cc785ddac0aab330825c7dfbf78d9e187999161dfe26c0dd5eda77070dc3a7e7f1ae5465b6737a297cb843c7043a2a062df4f77b5e80

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks