General

  • Target

    RUNTWAREV2.exe

  • Size

    227KB

  • Sample

    231128-z5m73acg7x

  • MD5

    6a3f3ce9e59e7f8b18895edb0ccb8e4f

  • SHA1

    81da4be170d0e4be51014e5bccc89c09f0c95202

  • SHA256

    dee17b4eadaee39276596882c2c60a1b59451017aa91f5c255dee92ae6689449

  • SHA512

    b9caa7e6020d9c7b2442b351a03215a4dece45613918936f848de180b5da92286a20ea8527c676b6fd0d4843a7c2fd9f9123c85c8630e62b883a907ae0101fba

  • SSDEEP

    6144:+loZM+rIkd8g+EtXHkv/iD44AummkrHMV9YW3X2cAb8e1mxzOi:ooZtL+EP84AummkrHMV9YW3X21Azj

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1178414555500662874/3K_NTX49w4HoBfQ2mxqBA5rbiJf28MYcn8clV-B06GIV1M_UZq1dpXpzq5rEHUVcDrzk

Targets

    • Target

      RUNTWAREV2.exe

    • Size

      227KB

    • MD5

      6a3f3ce9e59e7f8b18895edb0ccb8e4f

    • SHA1

      81da4be170d0e4be51014e5bccc89c09f0c95202

    • SHA256

      dee17b4eadaee39276596882c2c60a1b59451017aa91f5c255dee92ae6689449

    • SHA512

      b9caa7e6020d9c7b2442b351a03215a4dece45613918936f848de180b5da92286a20ea8527c676b6fd0d4843a7c2fd9f9123c85c8630e62b883a907ae0101fba

    • SSDEEP

      6144:+loZM+rIkd8g+EtXHkv/iD44AummkrHMV9YW3X2cAb8e1mxzOi:ooZtL+EP84AummkrHMV9YW3X21Azj

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks