General

  • Target

    RblxPredictor.exe

  • Size

    103KB

  • Sample

    240131-18dcpsdde9

  • MD5

    d5ddffc51d7b2cc9297d984c120cdde0

  • SHA1

    79449fd5184c14db0ad7cbe9f219e1d74dc3e9d7

  • SHA256

    0858625d045eca0faee93b5f9cd1fa7336d1b9486c31662ca81cb4a96fe7e933

  • SHA512

    9222cd73f9e044fc852e1b131966cc3ec8e3065a6f44c68406fcd208bd8a0d84e52b6e794cb4de61934ffe38bdde92ee6130059a7dd7a42327088ff5cc67ee60

  • SSDEEP

    1536:XDrxkG8nLtvQRq9y/rN9D4za4qMZSn3DMXAijnLu6gtYrm/GdHhVaF7bRmr:Jv8nBvQ89yJ9OqeS3Tirq6gUPmnRmr

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1202258317611892827/v4k7Pssz-HUQjgkXaGS-5oWtegaSVqWhOFgxXn1UZZWsgQVeIlZd-Tr4G0cbLltW6l-a

Targets

    • Target

      RblxPredictor.exe

    • Size

      103KB

    • MD5

      d5ddffc51d7b2cc9297d984c120cdde0

    • SHA1

      79449fd5184c14db0ad7cbe9f219e1d74dc3e9d7

    • SHA256

      0858625d045eca0faee93b5f9cd1fa7336d1b9486c31662ca81cb4a96fe7e933

    • SHA512

      9222cd73f9e044fc852e1b131966cc3ec8e3065a6f44c68406fcd208bd8a0d84e52b6e794cb4de61934ffe38bdde92ee6130059a7dd7a42327088ff5cc67ee60

    • SSDEEP

      1536:XDrxkG8nLtvQRq9y/rN9D4za4qMZSn3DMXAijnLu6gtYrm/GdHhVaF7bRmr:Jv8nBvQ89yJ9OqeS3Tirq6gUPmnRmr

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks