General

  • Target

    Stealer.exe

  • Size

    229KB

  • MD5

    5e9fbeae3fc8b7f8d211e3dfef5a9529

  • SHA1

    004f89d75ed6d4e298a51c91107164a4715055f5

  • SHA256

    69ec0a7651b38096910fece1b2a8cb6f9be056c94d183b4f92564330b44ffb0b

  • SHA512

    200b73155818389d36af61e08bc365997daa6662010f34f67cbbc078d0cc9f0adacc791599b24c7822be98b69882130764a65c65919fa070d8a4a382a5cca58c

  • SSDEEP

    6144:tloZM+rIkd8g+EtXHkv/iD4XoojpaC9aop7mGzBfFtLBj8e1mn3i:voZtL+EP8XoojpaC9aop7mGzJPLRiS

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1276256339731021864/jJp79p0HMuKjHuBTmwZWgGIySxjTukGa2--S4PeV_0LgeWLFchmvJuS0_FPJiSSgzLpN

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Stealer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections