General

  • Target

    Fortnite.exe

  • Size

    227KB

  • Sample

    241107-xx7kmaxeld

  • MD5

    9b107d5d9f8df40eb30e3168ebe6f9dd

  • SHA1

    6b61781552e8173e5bc446128b0683e3dde7ad68

  • SHA256

    e6f71ac80e3dab87309de89a4840824b680ae897c19bda25a766b216595f30c5

  • SHA512

    0a504481a0413a3de4d0e6e2a000a2371be46d6896c399b635f8e3ad7b5a777678a82502a2ec02ead689068c1a7ca9ceffddc7ce47607eff405dde9b7eaeb7fc

  • SSDEEP

    6144:eloZM+rIkd8g+EtXHkv/iD45CcwZCl38e1mBi:IoZtL+EP8RNZ

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1303698745497747511/SnUKC9sR9ycNE1CskwuavqmgNSracYu2d2x4rnwrxYQ91OKqtgLWRDAMJ3OoDH3KnesY

Targets

    • Target

      Fortnite.exe

    • Size

      227KB

    • MD5

      9b107d5d9f8df40eb30e3168ebe6f9dd

    • SHA1

      6b61781552e8173e5bc446128b0683e3dde7ad68

    • SHA256

      e6f71ac80e3dab87309de89a4840824b680ae897c19bda25a766b216595f30c5

    • SHA512

      0a504481a0413a3de4d0e6e2a000a2371be46d6896c399b635f8e3ad7b5a777678a82502a2ec02ead689068c1a7ca9ceffddc7ce47607eff405dde9b7eaeb7fc

    • SSDEEP

      6144:eloZM+rIkd8g+EtXHkv/iD45CcwZCl38e1mBi:IoZtL+EP8RNZ

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks