General

  • Target

    InjectorModule.exe

  • Size

    229KB

  • Sample

    250209-15ljxavkbn

  • MD5

    ef708c0fbad6af1b868783a4abf5f924

  • SHA1

    6887cb88854b3938f5fcd65d8673337f92ad6f4d

  • SHA256

    477d4c159e948921bb8be203203e55d71e05e4733a9a69c7a33595114cf6d458

  • SHA512

    38e7f1a4c3a94ea2777b8611b8a350a5633c30b1e765c65e4eea4d0683a0e5851f9397d4fd6539acf1bb2d9a5fae443720c965020f09451706e5c4617d419282

  • SSDEEP

    6144:tloZMmrIkd8g+EtXHkv/iD4xhuWT5KyNL4ZL22jqenb8e1mk2i:voZ1L+EP8xhuWT5KyNL4ZL22jqwD7

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1338245525165576193/SggJ1WgoUftBDG4Mzc2bJM_Tl_KUXeSIWY4AIo_6L_cOV-bXr1Atupaasyd4k4nB-KDB

Targets

    • Target

      InjectorModule.exe

    • Size

      229KB

    • MD5

      ef708c0fbad6af1b868783a4abf5f924

    • SHA1

      6887cb88854b3938f5fcd65d8673337f92ad6f4d

    • SHA256

      477d4c159e948921bb8be203203e55d71e05e4733a9a69c7a33595114cf6d458

    • SHA512

      38e7f1a4c3a94ea2777b8611b8a350a5633c30b1e765c65e4eea4d0683a0e5851f9397d4fd6539acf1bb2d9a5fae443720c965020f09451706e5c4617d419282

    • SSDEEP

      6144:tloZMmrIkd8g+EtXHkv/iD4xhuWT5KyNL4ZL22jqenb8e1mk2i:voZ1L+EP8xhuWT5KyNL4ZL22jqwD7

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

MITRE ATT&CK Matrix

Tasks