General

  • Target

    sinfulsassist.exe

  • Size

    232KB

  • Sample

    240220-bd4tqsha47

  • MD5

    6bd66ae3d6ad55de0d3bfd026ab642f8

  • SHA1

    b9c03630edcb053a0f14970ea7085a8a2a285d8a

  • SHA256

    80e1636664daed3c4c919584a40b1404807ff859fcb98267abdbe487c9a16c1f

  • SHA512

    c776fe3939329bfd47c447d069f89976acedb90853ab3d16386afab6123c7f1dfd9aadbbefa458226c4065452fdfd6d5dfc0a8162950d65818d7039ab92513fa

  • SSDEEP

    6144:tloZMArIkd8g+EtXHkv/iD4xR8KfVealwgRj++71Nb8e1mRi:voZHL+EP8xR8KfVealwgRj++7X3

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1209300482791571506/jtacisBH4RYssA6FXpFMLRZUsTlqXPQd2aCkNsLdrWFR1ebSB4aNFfCmGPwZyjCk-eaH

Targets

    • Target

      sinfulsassist.exe

    • Size

      232KB

    • MD5

      6bd66ae3d6ad55de0d3bfd026ab642f8

    • SHA1

      b9c03630edcb053a0f14970ea7085a8a2a285d8a

    • SHA256

      80e1636664daed3c4c919584a40b1404807ff859fcb98267abdbe487c9a16c1f

    • SHA512

      c776fe3939329bfd47c447d069f89976acedb90853ab3d16386afab6123c7f1dfd9aadbbefa458226c4065452fdfd6d5dfc0a8162950d65818d7039ab92513fa

    • SSDEEP

      6144:tloZMArIkd8g+EtXHkv/iD4xR8KfVealwgRj++71Nb8e1mRi:voZHL+EP8xR8KfVealwgRj++7X3

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks