General

  • Target

    23bbb1d349bca5e6f35b2abe9ff078a6.bin

  • Size

    230KB

  • Sample

    240318-bcvjnsdc4t

  • MD5

    23bbb1d349bca5e6f35b2abe9ff078a6

  • SHA1

    99c3a493dacddcdb88a253a03dabe8fb3abae66c

  • SHA256

    30ad64434af97756c659a8b7f95efb915dcb18417ebbe373892e75bbdc6d3b13

  • SHA512

    9e1b0890fee33d9ca051c9bb0d6bda7fb9628dc7329cdb2fb78a9088c6440e203380c0ffae7d9e52c4320eb0cc1bc9967d73d680c8a15fb3e724390896d98dda

  • SSDEEP

    3072:D96kFx9JEA8VTF+529hA1MPgI8jh2UY06F7aQ47N3DhG05p1E2aR+LTIBmxR8e1u:Z6JxTF7hNPgXjUAhdGSpcRqD8e1LwQh

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1218668662437712013/H_BvHeUIH_D_PNxdoxE13ootR5Pu6pwvXPRY2yjIfHq2XT4cXk6szskVNKz9WfB8I9DJ

Targets

    • Target

      23bbb1d349bca5e6f35b2abe9ff078a6.bin

    • Size

      230KB

    • MD5

      23bbb1d349bca5e6f35b2abe9ff078a6

    • SHA1

      99c3a493dacddcdb88a253a03dabe8fb3abae66c

    • SHA256

      30ad64434af97756c659a8b7f95efb915dcb18417ebbe373892e75bbdc6d3b13

    • SHA512

      9e1b0890fee33d9ca051c9bb0d6bda7fb9628dc7329cdb2fb78a9088c6440e203380c0ffae7d9e52c4320eb0cc1bc9967d73d680c8a15fb3e724390896d98dda

    • SSDEEP

      3072:D96kFx9JEA8VTF+529hA1MPgI8jh2UY06F7aQ47N3DhG05p1E2aR+LTIBmxR8e1u:Z6JxTF7hNPgXjUAhdGSpcRqD8e1LwQh

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Enterprise v15

Tasks