General

  • Target

    puutin.png.exe

  • Size

    286KB

  • Sample

    240218-lxjb9ahb48

  • MD5

    69ae905eb53c2480dbbaeaf0070cf597

  • SHA1

    417e12e2cb4a86a1b76c7e4de1eee03aa3c55b91

  • SHA256

    41c96abcb552167c939b9f2f08e59d1608a35111dca47ecc14c6b7f7dfa1dcb7

  • SHA512

    f2700446ed7b33d233211ff8bb9072e8b78c726ea52b85e7a83ae41c006bae08f571b6f1e56f3397e99bfda7d6e87fcd0664929b80e90a806dac608b832564dc

  • SSDEEP

    6144:GloZMCrIkd8g+EtXHkv/iD4hHr0AmB5KP/Cwhl014b8e1mu0i4e+8T:woZZL+EP8hHr0AmB5KP/Cwhl0yX91T

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1194986139333967953/MaUld_ZSZR4-nceYC8ZTjsEVA6kWz0MlrslI1kSyJsiAyXl127esUjR68igwbUBTBGpq

Targets

    • Target

      puutin.png.exe

    • Size

      286KB

    • MD5

      69ae905eb53c2480dbbaeaf0070cf597

    • SHA1

      417e12e2cb4a86a1b76c7e4de1eee03aa3c55b91

    • SHA256

      41c96abcb552167c939b9f2f08e59d1608a35111dca47ecc14c6b7f7dfa1dcb7

    • SHA512

      f2700446ed7b33d233211ff8bb9072e8b78c726ea52b85e7a83ae41c006bae08f571b6f1e56f3397e99bfda7d6e87fcd0664929b80e90a806dac608b832564dc

    • SSDEEP

      6144:GloZMCrIkd8g+EtXHkv/iD4hHr0AmB5KP/Cwhl014b8e1mu0i4e+8T:woZZL+EP8hHr0AmB5KP/Cwhl0yX91T

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks