General

  • Target

    secondslut.exe

  • Size

    229KB

  • Sample

    240927-p8pvystcrp

  • MD5

    1d2a9064181fffe2ae21bb90c9691d2b

  • SHA1

    eb03952450e8f309fb04058759e142740eb08069

  • SHA256

    3d37df482191306f97b6a590305624e1316082e2b655812f4cda62641afd20e1

  • SHA512

    fd25b17d558304b816fdc76bdc979f0e054dd7090ee3051044ce3fa0ed4e1e1d059f447b412b0827d6897a43e21bda5d6e476b7ee2f78d8f3d233e9f04c82328

  • SSDEEP

    6144:FloZM3fsXtioRkts/cnnK6cMl97ERPlO2Zjc1niinbVb8e1moi:HoZ1tlRk83Ml97ERPlO2Zjc1niinZ2

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1289196962704265226/4SROW5curUe6n7EGqeWKq0HqFRBeB_OQKYzM0t6rypXLyCDNVVp4kP9wEcDGDnfwyigA

Targets

    • Target

      secondslut.exe

    • Size

      229KB

    • MD5

      1d2a9064181fffe2ae21bb90c9691d2b

    • SHA1

      eb03952450e8f309fb04058759e142740eb08069

    • SHA256

      3d37df482191306f97b6a590305624e1316082e2b655812f4cda62641afd20e1

    • SHA512

      fd25b17d558304b816fdc76bdc979f0e054dd7090ee3051044ce3fa0ed4e1e1d059f447b412b0827d6897a43e21bda5d6e476b7ee2f78d8f3d233e9f04c82328

    • SSDEEP

      6144:FloZM3fsXtioRkts/cnnK6cMl97ERPlO2Zjc1niinbVb8e1moi:HoZ1tlRk83Ml97ERPlO2Zjc1niinZ2

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks