General

  • Target

    skibidi skid.exe

  • Size

    230KB

  • Sample

    241018-x4wrpstgrc

  • MD5

    bb321be2af41fd03a125e37f7146a591

  • SHA1

    8fdc2f2fe8928810dd4db7e40a81c636f949e106

  • SHA256

    f24cbf246983996d9ae69e742f690f681bceaeba18d16eb23239312f8e0d71d8

  • SHA512

    c3e5154be7229cf549bf0d2f7607efc07dece886496e7245fdd28960350fd94cdbdf0a650bd5ed258c750616f2c7ddcfddf0925a4ab1fc7c1df4756755959003

  • SSDEEP

    6144:9loZM+rIkd8g+EtXHkv/iD4ze6ESQPL4UBECDjayGrcb8e1mzbi:foZtL+EP8ze6ESQPL4UBECDja5AF

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1296901499972223067/PRBmtBhRpapJ5FuNWZ5NgxdCJ85Rj4mv_a0NGRr0OEU9PaBiB6zJAWh5F7UUrn9ZYJYb

Targets

    • Target

      skibidi skid.exe

    • Size

      230KB

    • MD5

      bb321be2af41fd03a125e37f7146a591

    • SHA1

      8fdc2f2fe8928810dd4db7e40a81c636f949e106

    • SHA256

      f24cbf246983996d9ae69e742f690f681bceaeba18d16eb23239312f8e0d71d8

    • SHA512

      c3e5154be7229cf549bf0d2f7607efc07dece886496e7245fdd28960350fd94cdbdf0a650bd5ed258c750616f2c7ddcfddf0925a4ab1fc7c1df4756755959003

    • SSDEEP

      6144:9loZM+rIkd8g+EtXHkv/iD4ze6ESQPL4UBECDjayGrcb8e1mzbi:foZtL+EP8ze6ESQPL4UBECDja5AF

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks