General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    231231-sep6eabbb4

  • MD5

    5ec6cda5b85ebfb0f92c52746a8dd01f

  • SHA1

    0653b964a484e3c73877440f7366c0b477f4dbc0

  • SHA256

    cfa411af1d47bc7a40db5d2e085c8a8612c4d0eafb6bd3e2b03ec9ee93231b7d

  • SHA512

    0d357a50125de49172d0e672450e915c4e5ec121fbc22ab36146d23bfa23037549e31df9afcadfa0bbea6431eeb68ce02a40cf450c864808191018c94ddda73d

  • SSDEEP

    6144:lloZMUrIkd8g+EtXHkv/iD4amR+0ad1+H7mEl5QnIb8e1mBi:noZrL+EP8amR+0ad1+H7mEl5Qwb

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1178425579918348299/Im2YsHcysTWH3zzMC7dhoPY9LKT5g7uo_sPn8PhgJQlrkCDQumDskxS71Udatyw5CYuR

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      5ec6cda5b85ebfb0f92c52746a8dd01f

    • SHA1

      0653b964a484e3c73877440f7366c0b477f4dbc0

    • SHA256

      cfa411af1d47bc7a40db5d2e085c8a8612c4d0eafb6bd3e2b03ec9ee93231b7d

    • SHA512

      0d357a50125de49172d0e672450e915c4e5ec121fbc22ab36146d23bfa23037549e31df9afcadfa0bbea6431eeb68ce02a40cf450c864808191018c94ddda73d

    • SSDEEP

      6144:lloZMUrIkd8g+EtXHkv/iD4amR+0ad1+H7mEl5QnIb8e1mBi:noZrL+EP8amR+0ad1+H7mEl5Qwb

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks