General

  • Target

    0x0007000000015f71-121.dat

  • Size

    229KB

  • Sample

    241030-jlxz6azqcq

  • MD5

    06129ffc46e854930cfcaa754ca1d487

  • SHA1

    e7c173c48aa107ec63bd6f9030c9ec6fe889d832

  • SHA256

    10d28e18a7df4b2c30e05e5e361f1724e0b6ea8c021d8105ee30354be79b98d1

  • SHA512

    b7121a2a65f317edbc1b4dd8dec427c277fad2b521a211d1408bc06b79431c418dad32ed61481c5ef49511cd167846e026a86147ae77bd9b0e607918feb66ab9

  • SSDEEP

    6144:tloZM+rIkd8g+EtXHkv/iD4OUCKbhS6FOAxDeebn4b8e1mSTi:voZtL+EP8OUCKbhS6FOAxDeebAo

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1266665187293794356/BgUJDQi9QXAA0avjRcAiy-uTUWdbVUSk8SQjon--JNjDxPP5bEhE6DLfJFghJ_KLSRhA

Targets

    • Target

      0x0007000000015f71-121.dat

    • Size

      229KB

    • MD5

      06129ffc46e854930cfcaa754ca1d487

    • SHA1

      e7c173c48aa107ec63bd6f9030c9ec6fe889d832

    • SHA256

      10d28e18a7df4b2c30e05e5e361f1724e0b6ea8c021d8105ee30354be79b98d1

    • SHA512

      b7121a2a65f317edbc1b4dd8dec427c277fad2b521a211d1408bc06b79431c418dad32ed61481c5ef49511cd167846e026a86147ae77bd9b0e607918feb66ab9

    • SSDEEP

      6144:tloZM+rIkd8g+EtXHkv/iD4OUCKbhS6FOAxDeebn4b8e1mSTi:voZtL+EP8OUCKbhS6FOAxDeebAo

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks