Behavioral task
behavioral1
Sample
rc7.exe
Resource
win7-20230703-en
General
-
Target
rc7.exe
-
Size
240KB
-
MD5
0db546c07a75eaa50baff55111041731
-
SHA1
afea857574fca99f0073bc30edcb991324ba16c7
-
SHA256
ff56db9447153d81e78e46beb2ee25aca7ff02bab23be39bb24c8ee4d93021e3
-
SHA512
3d901cc503eba613fd124bb19a4962644493b8d327cd37c064fbaea526b9ec0c55000e945cceb602d17eb9f6b4474046cb871a9d2384f2b319adbfb71928f999
-
SSDEEP
6144:DloZM+rIkd8g+EtXHkv/iD4lpy4AmB5KP/Cwhl0Wzb8e1m1ZiX:hoZtL+EP8lpy4AmB5KP/Cwhl0caA
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1116068562331783239/pYoaRGQQxDu5yiFXO2V5FPx73m7R_kaS0Cek299-LGzPb6VbPbNaNC_E2cz8c8d982zw
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource rc7.exe
Files
-
rc7.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ