Resubmissions

05-07-2024 21:17

240705-z44teswcml 10

General

  • Target

    ElectricLauncher.7z

  • Size

    1.3MB

  • Sample

    240705-z44teswcml

  • MD5

    7b070352be4a4de1bf4ed91c6ca84113

  • SHA1

    3adb15bf02dadedd2ae8449a87a2de4c51b198c7

  • SHA256

    e76dad9eb611fc7e7fa6d2c3625afbb1d28a66486a6ad71525a7f303f1bfda5b

  • SHA512

    5a03720ce22f5df4a70bfda787b66883939dc98b8bd5fe5c573d79a925553b5a79837b68a2e97c18f17ce9d55bfc52744d7555138757ca9717f9871b7dee68b4

  • SSDEEP

    24576:9Aztjy0QPXD23Yj267nougdWNMa3dr1OAQOxv3zdFPE03EV45+qTsYkW5ai:Kzkdq67oaM+VrLUV45VLN5

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1255766296683876383/EUXvJL_7dggU_gWIv-zQwVmHyKiIXk4zB39svWUzwwxBLiTXWwgrnqxcuZtKxwPsc6sF

Targets

    • Target

      ElectricLauncher/ElectricLauncher.exe

    • Size

      1.5MB

    • MD5

      23531339397ea4fa14b3f7c86d0888d4

    • SHA1

      ea21b3cc32b2db572e1e2db505e37eff638dbaff

    • SHA256

      e4a0012a10fb49458a5bce7bcad0599db718a8b7eb0a81ff2d2f5a9ed76095c8

    • SHA512

      eccf9a833ef38adc4cdb6b1ef386a657e77d1fe5a75158219d1bc5691c0bf1d810a6e4b1c0b2b7038746fa056734fb8dc70e02fe15a43e7e6c0571c217d2ae45

    • SSDEEP

      24576:pzvL9lA/NfgTPXI23bggcdOOUxod72WNJa3Bu1OIQOxv3QdzPhzEEKE+Fch+ho4V:FxlA/1gvggcbnHJHVO9YEKE+F/o4iy

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks