General

  • Target

    Fpsunlockerexe.exe

  • Size

    231KB

  • MD5

    8e0d0543f4eb1e8e5d14a0ee3a7ac228

  • SHA1

    adfede75871a2196e79856335aca757ccaa3c1f0

  • SHA256

    5e9142e06299d70195c1d5876ee384995822943ea8747fc725830a7c7cac85d7

  • SHA512

    150aa1b2d7807e5b8283fa726015036862ee84ddcdc3b870a18da9d3f94ea7356ef2f62c0c21c1c6137a33ffa55ca52713558f08bcaeb4dca1dd63e6c8163d02

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD41Irt4+ZRS93q459cL8b8e1mVzi:DoZtL+EP81Irt4+ZRS93q459cIge

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1123698267734147092/H6VI6Ltd6c0H1neojvhDANzOgzs4lvN4697yRGsnC0bfPHO4TrnYRwot3r_kMRfc7-jX

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Fpsunlockerexe.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections