General

  • Target

    SolaraBoostrap .exe

  • Size

    229KB

  • Sample

    240702-yh272awcke

  • MD5

    b7741b6a5e172eff7edfdc9ab19a649f

  • SHA1

    9c80488d840a98dac3860e21f1fa6be89cc3e898

  • SHA256

    7f1e40b82781c6149dd6f963e81636d226fc993f11e0c842f0df1b3e7a10caf8

  • SHA512

    d1e8a4005dd8554a45434568025a19270c871e778fb640daf7eefcb9aaf11a487c5b6c68d88572727888adf7207b0cafc9f97021557ce4c8437afa6750714552

  • SSDEEP

    6144:tloZMNrIkd8g+EtXHkv/iD4gnEt5nsAvcOXZkQlTLb8e1msi:voZ2L+EP8gnEt5nsAvcOXZkQljW

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1242894085392568363/FhGhdyPJefyLDfUPdOOham6cLZKHBijqUa_c9wnXWQFBGqBESeRcsETkQ6t9yxrSoPTR

Targets

    • Target

      SolaraBoostrap .exe

    • Size

      229KB

    • MD5

      b7741b6a5e172eff7edfdc9ab19a649f

    • SHA1

      9c80488d840a98dac3860e21f1fa6be89cc3e898

    • SHA256

      7f1e40b82781c6149dd6f963e81636d226fc993f11e0c842f0df1b3e7a10caf8

    • SHA512

      d1e8a4005dd8554a45434568025a19270c871e778fb640daf7eefcb9aaf11a487c5b6c68d88572727888adf7207b0cafc9f97021557ce4c8437afa6750714552

    • SSDEEP

      6144:tloZMNrIkd8g+EtXHkv/iD4gnEt5nsAvcOXZkQlTLb8e1msi:voZ2L+EP8gnEt5nsAvcOXZkQljW

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

MITRE ATT&CK Matrix

Tasks