General

  • Target

    octoware in.exe

  • Size

    230KB

  • Sample

    241104-dhkmrsvkcr

  • MD5

    f5aff3ee2085e59f5549090cb00035e9

  • SHA1

    1d07fb7c1b310450774fb2b3c5b6506421c4b360

  • SHA256

    421b6a23785737dedb2b5f638e84445b2a9e9fa4f52fb1bcfdbfb3b254828e3a

  • SHA512

    05a4072f351eeae93b649c2bb1209aa295cc21a4664a3aed4cb1473351fd0777807f09940f781ccb02cf23060264102b9d893de69822246cb7b34bd7a47bcbc4

  • SSDEEP

    6144:9loZM0rIkd8g+EtXHkv/iD49YaHdmOhjU9va6vDbEtjXk8e1mTLi:foZDL+EP89YaHdmOhjU9va6vvUjKF

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1302426140438433792/1Ahi8IHszuHjuGXKtTu5l1w0ahCQNZxF92hHVPQOPp950ymIU-CBiVkqCx7S5cj9hQGH

Targets

    • Target

      octoware in.exe

    • Size

      230KB

    • MD5

      f5aff3ee2085e59f5549090cb00035e9

    • SHA1

      1d07fb7c1b310450774fb2b3c5b6506421c4b360

    • SHA256

      421b6a23785737dedb2b5f638e84445b2a9e9fa4f52fb1bcfdbfb3b254828e3a

    • SHA512

      05a4072f351eeae93b649c2bb1209aa295cc21a4664a3aed4cb1473351fd0777807f09940f781ccb02cf23060264102b9d893de69822246cb7b34bd7a47bcbc4

    • SSDEEP

      6144:9loZM0rIkd8g+EtXHkv/iD49YaHdmOhjU9va6vDbEtjXk8e1mTLi:foZDL+EP89YaHdmOhjU9va6vvUjKF

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks