General

  • Target

    PandziakWyszukiwarka.exe

  • Size

    227KB

  • Sample

    240403-w8h6qshe29

  • MD5

    778297c513db9d797b7248d086df9961

  • SHA1

    b1ab5453c0821d49a7e1769bd9c9d728536efd85

  • SHA256

    fac617bf9c4e4640025850beac879d857fd29365b98843c0a33dc2a7ead77a14

  • SHA512

    116f43b70a2400ef281f6f8e5ab129a6622eaac945d8fc4a4e765d1cb6b0cfd532d2807e5b496921b36f1692f43e32d3e7d607f4f9e31b7fac787e3aa56d7be7

  • SSDEEP

    6144:eloZM+rIkd8g+EtXHkv/iD4u2gBGELnsld42X3Wz9hb8e1m+pi:IoZtL+EP8u2gBGELnsld42X3WDa

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1225124700347301888/IGR7w5cMi1SqxWS_tfI5lpNKpALm0T3_0tsOE5S9ny9TEzTUV6PnJTsiRfLhvmY4ejrc

Targets

    • Target

      PandziakWyszukiwarka.exe

    • Size

      227KB

    • MD5

      778297c513db9d797b7248d086df9961

    • SHA1

      b1ab5453c0821d49a7e1769bd9c9d728536efd85

    • SHA256

      fac617bf9c4e4640025850beac879d857fd29365b98843c0a33dc2a7ead77a14

    • SHA512

      116f43b70a2400ef281f6f8e5ab129a6622eaac945d8fc4a4e765d1cb6b0cfd532d2807e5b496921b36f1692f43e32d3e7d607f4f9e31b7fac787e3aa56d7be7

    • SSDEEP

      6144:eloZM+rIkd8g+EtXHkv/iD4u2gBGELnsld42X3Wz9hb8e1m+pi:IoZtL+EP8u2gBGELnsld42X3WDa

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Enterprise v15

Tasks