General

  • Target

    Galaxy Swapper V3.exe

  • Size

    229KB

  • Sample

    240925-vjc3rawgjj

  • MD5

    a42b110fb9cfb30ec45c6062dcfbb754

  • SHA1

    4376c74bff24fd74c10ec920f13a48c87ed2b961

  • SHA256

    c447ffa201b6c129eaeb205610b9fe4cdde08f703f4bbbaccf65eab904626ee8

  • SHA512

    d1da7af81942a0732d45cfb1c0b758c20b5cefcf9780c5d80335259fe5333309b9cc9019b87e048e11c8e152e4250ae45eb6d86404bdbbf27ad38d6eaf33c62d

  • SSDEEP

    6144:FloZMLrIkd8g+EtXHkv/iD4OtBlKInDAUZMK7bC3Bb8e1mfi:HoZ0L+EP8OtBlKInDAUZMK7bCJl

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1287234221945000051/klsI9ScjwmWRugMc-XHoSBV9vEyU6Ygnjd04SIlzZk9pL8aq43wqxBQxGHa6FYf6D9cy

Targets

    • Target

      Galaxy Swapper V3.exe

    • Size

      229KB

    • MD5

      a42b110fb9cfb30ec45c6062dcfbb754

    • SHA1

      4376c74bff24fd74c10ec920f13a48c87ed2b961

    • SHA256

      c447ffa201b6c129eaeb205610b9fe4cdde08f703f4bbbaccf65eab904626ee8

    • SHA512

      d1da7af81942a0732d45cfb1c0b758c20b5cefcf9780c5d80335259fe5333309b9cc9019b87e048e11c8e152e4250ae45eb6d86404bdbbf27ad38d6eaf33c62d

    • SSDEEP

      6144:FloZMLrIkd8g+EtXHkv/iD4OtBlKInDAUZMK7bC3Bb8e1mfi:HoZ0L+EP8OtBlKInDAUZMK7bCJl

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks