General

  • Target

    5af4a6acd79b023a9149a31fb1769b7d058b74604bfdd36337c75cca3a47d979

  • Size

    229KB

  • Sample

    250222-3axd2a1lf1

  • MD5

    b08dd189fe369fc815b6a5e33234d43e

  • SHA1

    45371d00cee048328c2c29ad4155cdf964c124b4

  • SHA256

    5af4a6acd79b023a9149a31fb1769b7d058b74604bfdd36337c75cca3a47d979

  • SHA512

    174c941fa210f7b9dce9f30ddf3bfcbeca069966aefc2964aa54d3b4052a995a5e87ea119016e3de01a13b9d76a1714c4886965227b5818277d41daab3e8eb63

  • SSDEEP

    6144:FloZM+rIkd8g+EtXHkv/iD4DKWiiAfboqxUyzzqcJb8e1m0Yi:HoZtL+EP8DKWiiAfboqxUyzzqsd

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1336637633069187123/cni2pZnSirmp_aAVBBgAbBaiReZ7XTYDEaJEpPe9h8Hx8ctQbPJs02I6SYHVBAJvEAnb

Targets

    • Target

      5af4a6acd79b023a9149a31fb1769b7d058b74604bfdd36337c75cca3a47d979

    • Size

      229KB

    • MD5

      b08dd189fe369fc815b6a5e33234d43e

    • SHA1

      45371d00cee048328c2c29ad4155cdf964c124b4

    • SHA256

      5af4a6acd79b023a9149a31fb1769b7d058b74604bfdd36337c75cca3a47d979

    • SHA512

      174c941fa210f7b9dce9f30ddf3bfcbeca069966aefc2964aa54d3b4052a995a5e87ea119016e3de01a13b9d76a1714c4886965227b5818277d41daab3e8eb63

    • SSDEEP

      6144:FloZM+rIkd8g+EtXHkv/iD4DKWiiAfboqxUyzzqcJb8e1m0Yi:HoZtL+EP8DKWiiAfboqxUyzzqsd

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks