General
-
Target
VSMA2biL
-
Size
2KB
-
Sample
230628-1gkygacb2x
-
MD5
d4822f078c08991bc098f36191dac13d
-
SHA1
81d75fc6905baac0e8960fd7175b96eb37d8a601
-
SHA256
3f9f090495745e9e0dab12b90f3f327c4b440ed528a12bf2ad9d9e28f75492f6
-
SHA512
d7edab496d56c9ec7ced99f591d54aacbe30c2bb7fdf41ebe877291de0e3d318a1dabe2f72a66a5a51ccfb479ed527576ad4848984d67423f561f0b764d9cb2b
Static task
static1
Behavioral task
behavioral1
Sample
VSMA2biL.html
Resource
win7-20230621-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1123698267734147092/H6VI6Ltd6c0H1neojvhDANzOgzs4lvN4697yRGsnC0bfPHO4TrnYRwot3r_kMRfc7-jX
Targets
-
-
Target
VSMA2biL
-
Size
2KB
-
MD5
d4822f078c08991bc098f36191dac13d
-
SHA1
81d75fc6905baac0e8960fd7175b96eb37d8a601
-
SHA256
3f9f090495745e9e0dab12b90f3f327c4b440ed528a12bf2ad9d9e28f75492f6
-
SHA512
d7edab496d56c9ec7ced99f591d54aacbe30c2bb7fdf41ebe877291de0e3d318a1dabe2f72a66a5a51ccfb479ed527576ad4848984d67423f561f0b764d9cb2b
-
Detect Umbral payload
-
Executes dropped EXE
-