General

  • Target

    EacBypassGLOBAL.exe

  • Size

    312KB

  • Sample

    241113-qsxrassfmc

  • MD5

    312f3cb6ec13f32fa7e70ca7717fdfe4

  • SHA1

    6324c2bb52adcf190dcdf41acd426599751da68f

  • SHA256

    b76766976849bada142b6825d45e1a0b4054dc948a990f7fa8cd8291c1731ba4

  • SHA512

    bc3ba54a285b1d714b86e558d6e65fd2e9a1c87b7977cf4345451148fbabfbd9563d732237ee26bb06471b8c39b25bbdd64deed19c87e646fb116c3080374a1c

  • SSDEEP

    6144:1loZM+rIkd8g+EtXHkv/iD4ndCljpaC9mop7mGzdwb8e1mXiM6hd39hikTH1:XoZtL+EP8ndCljpaC9mop7mGzS9L3z

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1304952098731065366/QFf4QUKlFSXDbfmVZmM_Q12PGoHOEG7Bydrdj0oSxgOcQAdGFm31oHM8F8AncKsNVDiz

Targets

    • Target

      EacBypassGLOBAL.exe

    • Size

      312KB

    • MD5

      312f3cb6ec13f32fa7e70ca7717fdfe4

    • SHA1

      6324c2bb52adcf190dcdf41acd426599751da68f

    • SHA256

      b76766976849bada142b6825d45e1a0b4054dc948a990f7fa8cd8291c1731ba4

    • SHA512

      bc3ba54a285b1d714b86e558d6e65fd2e9a1c87b7977cf4345451148fbabfbd9563d732237ee26bb06471b8c39b25bbdd64deed19c87e646fb116c3080374a1c

    • SSDEEP

      6144:1loZM+rIkd8g+EtXHkv/iD4ndCljpaC9mop7mGzdwb8e1mXiM6hd39hikTH1:XoZtL+EP8ndCljpaC9mop7mGzS9L3z

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks