General

  • Target

    26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73aN.exe

  • Size

    266KB

  • Sample

    250208-sblc2s1mes

  • MD5

    06ed69fb8603816d21c0a44d500ed3f0

  • SHA1

    646c21d11c839557646068074fb913644104fc1a

  • SHA256

    26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73a

  • SHA512

    4979eb18a80869aefb0f6ac9717f17a4f36bc8eaeb8a79552ca7d083ba7b99034f5abd00004580af163cfa4f4b1773651ade929b5e78cc6a8ce8b6ca56570fa2

  • SSDEEP

    6144:HloZMLrIkd8g+EtXHkv/iD4LEXrfPlO2Zic1niinT4Xb8e1mfi/eY:FoZ0L+EP8LQrfPlO2Zic1niinTqh/Z

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1334918270951751742/ykbIeRIpFV4Px7Tfz8ZJbhs4zhUhLmHPwyt3wHsYxrJVNpFb643KDrwkegj27iGah8Yg

Targets

    • Target

      26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73aN.exe

    • Size

      266KB

    • MD5

      06ed69fb8603816d21c0a44d500ed3f0

    • SHA1

      646c21d11c839557646068074fb913644104fc1a

    • SHA256

      26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73a

    • SHA512

      4979eb18a80869aefb0f6ac9717f17a4f36bc8eaeb8a79552ca7d083ba7b99034f5abd00004580af163cfa4f4b1773651ade929b5e78cc6a8ce8b6ca56570fa2

    • SSDEEP

      6144:HloZMLrIkd8g+EtXHkv/iD4LEXrfPlO2Zic1niinT4Xb8e1mfi/eY:FoZ0L+EP8LQrfPlO2Zic1niinTqh/Z

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Downloads MZ/PE file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks