General
-
Target
Umbral.exe
-
Size
495KB
-
Sample
241029-mt4dpavckp
-
MD5
582bc7b05114af523db760bc2380ec80
-
SHA1
54b26ee9d7cd0f922d5e851696099c4b6fa849f2
-
SHA256
751dee488d8148db816da1f2326e37e579c116f76e4f8cdf21a25d1f85e74ffe
-
SHA512
9643b236e15cb9364a1e9cdd322d16d101a9ee804f958565c95037e18fae94d687c2c0c6e7cb776b00aac55e052ef1decce46189b35ffdce8dca74f910b39777
-
SSDEEP
6144:vloZM+rIkd8g+EtXHkv/iD4zyPvRDAmB5KW/Cwhl0zjb8e1m0iDc:NoZtL+EP8zyPvRDAmB5KW/Cwhl076
Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1300771808978665563/EvKrgWbAK7yHUuWxSc5FEsBgobFenskn3viAqiBdAAnSaFNWdP4H4VihPWTesZ6FKRkC
Targets
-
-
Target
Umbral.exe
-
Size
495KB
-
MD5
582bc7b05114af523db760bc2380ec80
-
SHA1
54b26ee9d7cd0f922d5e851696099c4b6fa849f2
-
SHA256
751dee488d8148db816da1f2326e37e579c116f76e4f8cdf21a25d1f85e74ffe
-
SHA512
9643b236e15cb9364a1e9cdd322d16d101a9ee804f958565c95037e18fae94d687c2c0c6e7cb776b00aac55e052ef1decce46189b35ffdce8dca74f910b39777
-
SSDEEP
6144:vloZM+rIkd8g+EtXHkv/iD4zyPvRDAmB5KW/Cwhl0zjb8e1m0iDc:NoZtL+EP8zyPvRDAmB5KW/Cwhl076
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-