General

  • Target

    1393b0c97caf1417c3b7e7d16ad85d1796f4bd6d085e97ccf78fd1020913d8b7.exe

  • Size

    230KB

  • Sample

    250323-3wvsbszxcx

  • MD5

    46f2eeaafd8bb528c2014436845b26d8

  • SHA1

    f224d975e8ab9eed692efecb7ff0eb7556af8b49

  • SHA256

    1393b0c97caf1417c3b7e7d16ad85d1796f4bd6d085e97ccf78fd1020913d8b7

  • SHA512

    4b5075b7d9444bbbe152018a92ddb58fa582832a20d80e7e1175eb419f4647d75359371e9bb35bf4af484e8db9d731f18116a3e9c5fe008881767bb3048ef93f

  • SSDEEP

    6144:dloZM+rIkd8g+EtXHkv/iD4LJeTywvrYChkijD6h1b8e1mFi0:/oZtL+EP8LJeTywvrYChkijD6b30

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1346912507297665157/uDKD0ttMfrz6-Ef2TeBQjSPQQkrfVRgCLkOzkNx0dlhf40R4BBQM8ihzknZZ8aJupwcg

Targets

    • Target

      1393b0c97caf1417c3b7e7d16ad85d1796f4bd6d085e97ccf78fd1020913d8b7.exe

    • Size

      230KB

    • MD5

      46f2eeaafd8bb528c2014436845b26d8

    • SHA1

      f224d975e8ab9eed692efecb7ff0eb7556af8b49

    • SHA256

      1393b0c97caf1417c3b7e7d16ad85d1796f4bd6d085e97ccf78fd1020913d8b7

    • SHA512

      4b5075b7d9444bbbe152018a92ddb58fa582832a20d80e7e1175eb419f4647d75359371e9bb35bf4af484e8db9d731f18116a3e9c5fe008881767bb3048ef93f

    • SSDEEP

      6144:dloZM+rIkd8g+EtXHkv/iD4LJeTywvrYChkijD6h1b8e1mFi0:/oZtL+EP8LJeTywvrYChkijD6b30

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks