General

  • Target

    v9ju88.exe

  • Size

    229KB

  • Sample

    241020-vkrmja1flk

  • MD5

    9252505656ab18c34d4ecff6a7f86263

  • SHA1

    dfa01cbe5c99fbf67a5063f99c67669382e43356

  • SHA256

    78da8433390c0aaf2e5f748ff266bacad23fe9d05b1834eabceeb6ad69859589

  • SHA512

    5e270de9982c3137c16e32fa4c88f9a414893c623fbcdd5cb2f3ff9bbf82eac82bb8d01100d60ea8633da875b36df39d657a9090e393d4fdf717575821bce8a5

  • SSDEEP

    6144:lloZMcrIkd8g+EtXHkv/iD4l6qZEKtFu9r20VJgU8b8e1mbDi:noZrL+EP8l6qZEKtFu9r20VJgZd

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1289681227711905882/4ls8QquqVGowr_EXsWQHgHYoYI53Bn36p04PP2sNUo6M6rTng5alXP6ABgXbGM7xSIBW

Targets

    • Target

      v9ju88.exe

    • Size

      229KB

    • MD5

      9252505656ab18c34d4ecff6a7f86263

    • SHA1

      dfa01cbe5c99fbf67a5063f99c67669382e43356

    • SHA256

      78da8433390c0aaf2e5f748ff266bacad23fe9d05b1834eabceeb6ad69859589

    • SHA512

      5e270de9982c3137c16e32fa4c88f9a414893c623fbcdd5cb2f3ff9bbf82eac82bb8d01100d60ea8633da875b36df39d657a9090e393d4fdf717575821bce8a5

    • SSDEEP

      6144:lloZMcrIkd8g+EtXHkv/iD4l6qZEKtFu9r20VJgU8b8e1mbDi:noZrL+EP8l6qZEKtFu9r20VJgZd

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks