General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
250411-me81mawvgv
-
MD5
dcd9253fa3b14afa8d8e636315517897
-
SHA1
37fcf6a0b4b67e99ad6b4e2c51f0fab9f0874052
-
SHA256
83fa6a1e67c9ecd7ec68e905c4474274340b96b718da2dbab29cc7fcc4c3e414
-
SHA512
6cdc1cb0795a2ce33c377141b643b969da1ac7b9708a348115cfe89522f605c99b2f8c3f5cbe08059af0fae1e1a44e9cf05728de7fc50aeb8a78d813e7d80758
-
SSDEEP
6144:FloZMNrIkd8g+EtXHkv/iD42ZdOecfVeGJeMFXSy3sLb8e1mPwi:HoZmL+EP8EdOecfVeGJeMFXSy3+i
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1359970812253311018/zRLC6mLNUMn_2woo-dOFtgdF3pX26vXXypDT8injvHCd0rUGeHfrx8qiBW3dThiGJXSN
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
dcd9253fa3b14afa8d8e636315517897
-
SHA1
37fcf6a0b4b67e99ad6b4e2c51f0fab9f0874052
-
SHA256
83fa6a1e67c9ecd7ec68e905c4474274340b96b718da2dbab29cc7fcc4c3e414
-
SHA512
6cdc1cb0795a2ce33c377141b643b969da1ac7b9708a348115cfe89522f605c99b2f8c3f5cbe08059af0fae1e1a44e9cf05728de7fc50aeb8a78d813e7d80758
-
SSDEEP
6144:FloZMNrIkd8g+EtXHkv/iD42ZdOecfVeGJeMFXSy3sLb8e1mPwi:HoZmL+EP8EdOecfVeGJeMFXSy3+i
-
Detect Umbral payload
-
Umbral family
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-