General

  • Target

    c43547f748a52c7acfff1277e74786ec7f077c43c38e790e8a35ef746ff2c371N.exe

  • Size

    230KB

  • Sample

    250323-bvn5lsvze1

  • MD5

    b49420e3edc45ce1e356a5b8fa2a9c90

  • SHA1

    8e8db5c97a1a4a80ee366269e841df2b2ae523c7

  • SHA256

    c43547f748a52c7acfff1277e74786ec7f077c43c38e790e8a35ef746ff2c371

  • SHA512

    c0ab221a259f4a112a1459ffd231f078d097e63ebd5c05f77c5746b03f1020969e375b78c438c675ddb01062dd87235253e13187ff0f6576e4589ca3157029fe

  • SSDEEP

    6144:dloZM+rIkd8g+EtXHkv/iD4LJeTywvrYChkijD6h1b8e1mFi:/oZtL+EP8LJeTywvrYChkijD6b3

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1346912507297665157/uDKD0ttMfrz6-Ef2TeBQjSPQQkrfVRgCLkOzkNx0dlhf40R4BBQM8ihzknZZ8aJupwcg

Targets

    • Target

      c43547f748a52c7acfff1277e74786ec7f077c43c38e790e8a35ef746ff2c371N.exe

    • Size

      230KB

    • MD5

      b49420e3edc45ce1e356a5b8fa2a9c90

    • SHA1

      8e8db5c97a1a4a80ee366269e841df2b2ae523c7

    • SHA256

      c43547f748a52c7acfff1277e74786ec7f077c43c38e790e8a35ef746ff2c371

    • SHA512

      c0ab221a259f4a112a1459ffd231f078d097e63ebd5c05f77c5746b03f1020969e375b78c438c675ddb01062dd87235253e13187ff0f6576e4589ca3157029fe

    • SSDEEP

      6144:dloZM+rIkd8g+EtXHkv/iD4LJeTywvrYChkijD6h1b8e1mFi:/oZtL+EP8LJeTywvrYChkijD6b3

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks