General

  • Target

    Umbral.exe

  • Size

    227KB

  • Sample

    240317-x47tzaed21

  • MD5

    2f2e5193e34d583f15f52c8d525a48a0

  • SHA1

    971fdcf967c2017fa201b3d486ed80bb18eddf4a

  • SHA256

    721411866b84150806598c6f5fb21630a8ed056537c6fcb16a77c821dba8a3af

  • SHA512

    f766b15ccf10638d5912d737e66eecb04186f551f051e7bf829e935d3f54a54561f4d4b28b9ebfa271c6ecbf0dc929a8c8799f1d641dcb9adb196c8992482498

  • SSDEEP

    6144:sloZMCrIkd8g+EtXHkv/iD4XaqElGELns+d42X3WRfKb8e1m1i:qoZZL+EP8XaqElGELns+d42X3WROT

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1188552018617454692/Ys33b81wwvtYZVdTd7UGFkhOaFzsPrUPOogtZfG3Yxcl65A7aU-XFsL2Gk3Np2-NTW1U

Targets

    • Target

      Umbral.exe

    • Size

      227KB

    • MD5

      2f2e5193e34d583f15f52c8d525a48a0

    • SHA1

      971fdcf967c2017fa201b3d486ed80bb18eddf4a

    • SHA256

      721411866b84150806598c6f5fb21630a8ed056537c6fcb16a77c821dba8a3af

    • SHA512

      f766b15ccf10638d5912d737e66eecb04186f551f051e7bf829e935d3f54a54561f4d4b28b9ebfa271c6ecbf0dc929a8c8799f1d641dcb9adb196c8992482498

    • SSDEEP

      6144:sloZMCrIkd8g+EtXHkv/iD4XaqElGELns+d42X3WRfKb8e1m1i:qoZZL+EP8XaqElGELns+d42X3WROT

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks