General

  • Target

    umbral.exe

  • Size

    7.6MB

  • MD5

    60b6f42f8f3a0253ddf80a505669e8e0

  • SHA1

    6dfe8b8bfccbb0f019df1881984c9385db0989a9

  • SHA256

    405daf39022df42676c6601a3005cd08b9328698b3a61813c7c75a41e6b8d40b

  • SHA512

    402f55e8b24473c64b90c6706ea158514724cc1b514d486fdcebcc0e57b6be579dd5569a222a1d7296d8240b9936a4fb0b0c85df8d6848696cb08225ab5919d8

  • SSDEEP

    196608:VP0SQeNTfm/pf+xk4dNSESRGtrbWOjgWyi:Hy/pWu4m5RGtrbvMWyi

Score
10/10

Malware Config

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family

Files

  • umbral.exe
    .exe windows:5 windows x64 arch:x64

    Password: umbral

    2ac23c52e7647c5bbea38e98bb68c652


    Code Sign

    Headers

    Imports

    Sections

  • �O�1Lpo.pyc