General

  • Target

    8e8939fbaa52ccadfd4e24084263f926ac50b11652fb6cf19bb07ef12b556bd3

  • Size

    232KB

  • Sample

    250223-bwgf6atrfq

  • MD5

    66db4dd0fe39540a4a06297c780f7589

  • SHA1

    40c1d745042166f7d63b81971f2963bccad4a64d

  • SHA256

    8e8939fbaa52ccadfd4e24084263f926ac50b11652fb6cf19bb07ef12b556bd3

  • SHA512

    76674f895cd680941dbf3887970680817aa1734b87622b18bc8bdbcc90fc978d73701a5657ee72ffa6fdfc0f5113b0bda66ab8e9933e6071678c0536d07a5d42

  • SSDEEP

    6144:YloZM+rIkd8g+EtXHkv/iD4u1ddT5KyNV4ZL22jKwb8e1mjQi:GoZtL+EP8u1ddT5KyNV4ZL22j/AJ

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1340211028272611358/U3FF8YiRytrEHFw90ryNtla0KyBNYbUNWxcZsAp9Pp9fRnA9e7_H7KQRGVTn2PGfAEHS

Targets

    • Target

      8e8939fbaa52ccadfd4e24084263f926ac50b11652fb6cf19bb07ef12b556bd3

    • Size

      232KB

    • MD5

      66db4dd0fe39540a4a06297c780f7589

    • SHA1

      40c1d745042166f7d63b81971f2963bccad4a64d

    • SHA256

      8e8939fbaa52ccadfd4e24084263f926ac50b11652fb6cf19bb07ef12b556bd3

    • SHA512

      76674f895cd680941dbf3887970680817aa1734b87622b18bc8bdbcc90fc978d73701a5657ee72ffa6fdfc0f5113b0bda66ab8e9933e6071678c0536d07a5d42

    • SSDEEP

      6144:YloZM+rIkd8g+EtXHkv/iD4u1ddT5KyNV4ZL22jKwb8e1mjQi:GoZtL+EP8u1ddT5KyNV4ZL22j/AJ

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks