General

  • Target

    1a2d5e69f1dbd608bb2630f7c8ae2a07dc2fe5cdec2376319937bf7f62d468a4N

  • Size

    5.3MB

  • Sample

    241108-xxhaqsxhrp

  • MD5

    dc21bdd709b0043081f9d593c5eb0950

  • SHA1

    82b88aef7c24f5e4fb94d9cd619b2cf02d49482d

  • SHA256

    1a2d5e69f1dbd608bb2630f7c8ae2a07dc2fe5cdec2376319937bf7f62d468a4

  • SHA512

    b9d0ef3eb6611dc7b7649996da3da0ffcfc7c00af6735342d793acae766b0108ed815fb4d72ae98208e542dc3d704e1c2c3d9f384e3226559becc65ad7a4c5d5

  • SSDEEP

    98304:xivmGMDlsrwXdxIjBy6e5UZpqk8PEYw53:xvGMBpXdxIjByj5QpqfJQ

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1230529358272135229/UudHK5Ehya0aeui-YfuJN2oPhTPDyLENI0eay6qqi0U07DuiN2SxVvdUuelb3b1HDkUr

Targets

    • Target

      1a2d5e69f1dbd608bb2630f7c8ae2a07dc2fe5cdec2376319937bf7f62d468a4N

    • Size

      5.3MB

    • MD5

      dc21bdd709b0043081f9d593c5eb0950

    • SHA1

      82b88aef7c24f5e4fb94d9cd619b2cf02d49482d

    • SHA256

      1a2d5e69f1dbd608bb2630f7c8ae2a07dc2fe5cdec2376319937bf7f62d468a4

    • SHA512

      b9d0ef3eb6611dc7b7649996da3da0ffcfc7c00af6735342d793acae766b0108ed815fb4d72ae98208e542dc3d704e1c2c3d9f384e3226559becc65ad7a4c5d5

    • SSDEEP

      98304:xivmGMDlsrwXdxIjBy6e5UZpqk8PEYw53:xvGMBpXdxIjByj5QpqfJQ

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks