General

  • Target

    idk2.exe

  • Size

    235KB

  • Sample

    240229-egtpqacg4z

  • MD5

    ce4b4e4821aba2f7ea9aad57e60f9c3c

  • SHA1

    1f01a2d44d06ced9373687ae061f81540fa1c015

  • SHA256

    8d612921eca9c96803b1057e860d2d3236869bd3658b01fb7f3402134bd0300c

  • SHA512

    727a3cc82dfdaede3fdcab6bd1a52794e90e3a41560345cc82212aaf75a00a09d63c753cf23b5318ad5b58126f29696bc4fbffac4f9ea1eee0af195712dae085

  • SSDEEP

    6144:waeJtRSyn/TlQ1VFmqGF3+re5d0KkJ4tWDwp:wNPT/xAVPWUG0KkrD

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1205352570537775114/0TwopxZF8mZAIjdEowRHAiTqFbB8pjE6dzR2ST_E7pX5YXnZRcMh5QKMfo2QE94dAXKK

Targets

    • Target

      idk2.exe

    • Size

      235KB

    • MD5

      ce4b4e4821aba2f7ea9aad57e60f9c3c

    • SHA1

      1f01a2d44d06ced9373687ae061f81540fa1c015

    • SHA256

      8d612921eca9c96803b1057e860d2d3236869bd3658b01fb7f3402134bd0300c

    • SHA512

      727a3cc82dfdaede3fdcab6bd1a52794e90e3a41560345cc82212aaf75a00a09d63c753cf23b5318ad5b58126f29696bc4fbffac4f9ea1eee0af195712dae085

    • SSDEEP

      6144:waeJtRSyn/TlQ1VFmqGF3+re5d0KkJ4tWDwp:wNPT/xAVPWUG0KkrD

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks