General

  • Target

    Neverlose.exe

  • Size

    231KB

  • Sample

    241022-y6p8dasdma

  • MD5

    2a9d5da0bb69d53e1b68178bc63e9390

  • SHA1

    b1170f7ca36ea613188a272dc8ff8720a586de3a

  • SHA256

    b575e722311556b67bc4f2ff77470063e5453e8f9952ddcd33afec9bdefc3902

  • SHA512

    372288f96c8d39cba9529e7c44ce4b083eddf50dc3c3317b7b97c02d07018cdc2e0913da3e8309d548f80d68c95b9dd65e4febd4d7ca3b4d6a8df3360cf6aca3

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4ZvHYe5xypXKYZd8ZC6lY8e1mGi:joZtL+EP8pHYe5xypXKYZd8dk2

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1270399724431867935/HjClfkOVqhZa8ElKgkYuPRyoXVGf7yB2AqieOsUFaDEyif-Oe__Dw5TFjFKt_Mc4n-Dr

Targets

    • Target

      Neverlose.exe

    • Size

      231KB

    • MD5

      2a9d5da0bb69d53e1b68178bc63e9390

    • SHA1

      b1170f7ca36ea613188a272dc8ff8720a586de3a

    • SHA256

      b575e722311556b67bc4f2ff77470063e5453e8f9952ddcd33afec9bdefc3902

    • SHA512

      372288f96c8d39cba9529e7c44ce4b083eddf50dc3c3317b7b97c02d07018cdc2e0913da3e8309d548f80d68c95b9dd65e4febd4d7ca3b4d6a8df3360cf6aca3

    • SSDEEP

      6144:RloZM+rIkd8g+EtXHkv/iD4ZvHYe5xypXKYZd8ZC6lY8e1mGi:joZtL+EP8pHYe5xypXKYZd8dk2

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks