General

  • Target

    driverloader.exe

  • Size

    229KB

  • Sample

    240823-sxesdsvdll

  • MD5

    42c033c1207be55401d27198335476f4

  • SHA1

    6f17af9dabde85f9285e45f443aa64bcb61c35f7

  • SHA256

    bef3f8e3350b00f7e902560de251dc029553ec078edaf49531c1fe8ec220eb3b

  • SHA512

    5a02690e14dd014fd2e46e98fc8ac54e6ad6a6d3698b9ee95774874e1eddddcaf094782c6d10660a3f83016c1b881c21d68bd8d9be6af5a0c88e2acea10aac1d

  • SSDEEP

    6144:FloZMLrIkd8g+EtXHkv/iD4HVO3zZqStVY5rWWDBHb8e1mqDi:HoZ0L+EP8HVO3zZqStVY5rWWDF/O

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1276496146457559101/7_ptjDJWGansgnKVEYj-y4twxeR0-GnxdWKRrpBdnWLsTnqJjDk6El_U4WBbHCbTb1bd

Targets

    • Target

      driverloader.exe

    • Size

      229KB

    • MD5

      42c033c1207be55401d27198335476f4

    • SHA1

      6f17af9dabde85f9285e45f443aa64bcb61c35f7

    • SHA256

      bef3f8e3350b00f7e902560de251dc029553ec078edaf49531c1fe8ec220eb3b

    • SHA512

      5a02690e14dd014fd2e46e98fc8ac54e6ad6a6d3698b9ee95774874e1eddddcaf094782c6d10660a3f83016c1b881c21d68bd8d9be6af5a0c88e2acea10aac1d

    • SSDEEP

      6144:FloZMLrIkd8g+EtXHkv/iD4HVO3zZqStVY5rWWDBHb8e1mqDi:HoZ0L+EP8HVO3zZqStVY5rWWDF/O

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks