General
-
Target
Umbral.exe
-
Size
227KB
-
Sample
240317-x47tzaed21
-
MD5
2f2e5193e34d583f15f52c8d525a48a0
-
SHA1
971fdcf967c2017fa201b3d486ed80bb18eddf4a
-
SHA256
721411866b84150806598c6f5fb21630a8ed056537c6fcb16a77c821dba8a3af
-
SHA512
f766b15ccf10638d5912d737e66eecb04186f551f051e7bf829e935d3f54a54561f4d4b28b9ebfa271c6ecbf0dc929a8c8799f1d641dcb9adb196c8992482498
-
SSDEEP
6144:sloZMCrIkd8g+EtXHkv/iD4XaqElGELns+d42X3WRfKb8e1m1i:qoZZL+EP8XaqElGELns+d42X3WROT
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1188552018617454692/Ys33b81wwvtYZVdTd7UGFkhOaFzsPrUPOogtZfG3Yxcl65A7aU-XFsL2Gk3Np2-NTW1U
Targets
-
-
Target
Umbral.exe
-
Size
227KB
-
MD5
2f2e5193e34d583f15f52c8d525a48a0
-
SHA1
971fdcf967c2017fa201b3d486ed80bb18eddf4a
-
SHA256
721411866b84150806598c6f5fb21630a8ed056537c6fcb16a77c821dba8a3af
-
SHA512
f766b15ccf10638d5912d737e66eecb04186f551f051e7bf829e935d3f54a54561f4d4b28b9ebfa271c6ecbf0dc929a8c8799f1d641dcb9adb196c8992482498
-
SSDEEP
6144:sloZMCrIkd8g+EtXHkv/iD4XaqElGELns+d42X3WRfKb8e1m1i:qoZZL+EP8XaqElGELns+d42X3WROT
-
Detect Umbral payload
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-