General

  • Target

    Universal Hu6 and Aurium V4 [V11].exe

  • Size

    333KB

  • Sample

    241112-xtjdmaxqg1

  • MD5

    210d0781bb57f3a554c96bb467d6cd57

  • SHA1

    3be6edb49c63f7d9ee5f481c4d75f7f1d6ae2258

  • SHA256

    1fbf34bae8537e2ef6f1bf09ae1c0f7b3a802cf76a3114c4e80a7be28d1e2039

  • SHA512

    3c54403550f8885708d83bf5d23540946c33cd69ab6c990dd21f3b63803636fa202fbf2895cad830f6542ee90aa130ed3de07c117599c132295999882d955f72

  • SSDEEP

    6144:2loZMLrIkd8g+EtXHkv/iD4SL72ywvrYahkijD6I8nb8e1mlHaigvRYIcLbFNf45:AoZ0L+EP8SL72ywvrYahkijD6IaCf

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1280600499225104489/avTANN0ygl5E8mOKrpbAeCDqd1W0Hhauprkwd68SFSZ2Q9oC7b0dMrMrGrNlSXY-1gIo

Targets

    • Target

      Universal Hu6 and Aurium V4 [V11].exe

    • Size

      333KB

    • MD5

      210d0781bb57f3a554c96bb467d6cd57

    • SHA1

      3be6edb49c63f7d9ee5f481c4d75f7f1d6ae2258

    • SHA256

      1fbf34bae8537e2ef6f1bf09ae1c0f7b3a802cf76a3114c4e80a7be28d1e2039

    • SHA512

      3c54403550f8885708d83bf5d23540946c33cd69ab6c990dd21f3b63803636fa202fbf2895cad830f6542ee90aa130ed3de07c117599c132295999882d955f72

    • SSDEEP

      6144:2loZMLrIkd8g+EtXHkv/iD4SL72ywvrYahkijD6I8nb8e1mlHaigvRYIcLbFNf45:AoZ0L+EP8SL72ywvrYahkijD6IaCf

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks