General

  • Target

    fbef99cfebff61e55e4e068143becaab159985c397a9522e81c4b2e828c5ba0cN.exe

  • Size

    227KB

  • Sample

    250127-vjld5ayldv

  • MD5

    89f5085878a5723c112dc7d65e87f2d0

  • SHA1

    e171c8ce7c69aae5b024a58c8e3827abbd22ad0a

  • SHA256

    fbef99cfebff61e55e4e068143becaab159985c397a9522e81c4b2e828c5ba0c

  • SHA512

    77ca815e2c7eb8de08c67c8eed663e1a2d4f541bf020a09380297d24ec5a4a3047909025420b2bb6480a570de9cc53e1ac7f79c341d937b5a43d312ede746017

  • SSDEEP

    6144:eloZMBfsXtioRkts/cnnK6cMlFV1RIywvrYthkijD6frJR8eoy/i:IoZrtlRk83Mlv1RIywvrYthkijD6Cp

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1330562768184807524/rxDAbMSf0_m5rHqhNvYwhALkERyz3hX0ULP46Imw9VP5ql8yy2UqM3Eo9tg885cZEgxC

Targets

    • Target

      fbef99cfebff61e55e4e068143becaab159985c397a9522e81c4b2e828c5ba0cN.exe

    • Size

      227KB

    • MD5

      89f5085878a5723c112dc7d65e87f2d0

    • SHA1

      e171c8ce7c69aae5b024a58c8e3827abbd22ad0a

    • SHA256

      fbef99cfebff61e55e4e068143becaab159985c397a9522e81c4b2e828c5ba0c

    • SHA512

      77ca815e2c7eb8de08c67c8eed663e1a2d4f541bf020a09380297d24ec5a4a3047909025420b2bb6480a570de9cc53e1ac7f79c341d937b5a43d312ede746017

    • SSDEEP

      6144:eloZMBfsXtioRkts/cnnK6cMlFV1RIywvrYthkijD6frJR8eoy/i:IoZrtlRk83Mlv1RIywvrYthkijD6Cp

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.