General

  • Target

    # CELEX LEAKED.exe

  • Size

    232KB

  • Sample

    231212-3w194segb9

  • MD5

    8442a7b4adbddab8cf5216ca4dc24b86

  • SHA1

    a66d601df351ec4c6b7bb945bdcd3bf9141c5cc0

  • SHA256

    4c8fbdef33997462e43be2a94db398957b0d7fb3158e93e408b2ea530a06aa27

  • SHA512

    5d592e4f431349b03a4af51926384057a78d01d5568a1d1bcbe9f9bd05c6644d6c1ac37462e04352295aaae55ca1133761d17d1bc63b443987ceac666572fe2e

  • SSDEEP

    6144:rloZM+rIkd8g+EtXHkv/iD4KKZoDiAfbozxUyzzqqub8e1mXi:poZtL+EP8KwoDiAfbozxUyzzqxZ

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1159867757941248021/kDH2MiU4cAnsfOYaptXxvqYUieVnlJw2t5_0KzuiKnCK1LAiRTXBgUl31_OATShBGq4p

Targets

    • Target

      # CELEX LEAKED.exe

    • Size

      232KB

    • MD5

      8442a7b4adbddab8cf5216ca4dc24b86

    • SHA1

      a66d601df351ec4c6b7bb945bdcd3bf9141c5cc0

    • SHA256

      4c8fbdef33997462e43be2a94db398957b0d7fb3158e93e408b2ea530a06aa27

    • SHA512

      5d592e4f431349b03a4af51926384057a78d01d5568a1d1bcbe9f9bd05c6644d6c1ac37462e04352295aaae55ca1133761d17d1bc63b443987ceac666572fe2e

    • SSDEEP

      6144:rloZM+rIkd8g+EtXHkv/iD4KKZoDiAfbozxUyzzqqub8e1mXi:poZtL+EP8KwoDiAfbozxUyzzqxZ

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Enterprise v15

Tasks