General
-
Target
Ice.exe
-
Size
228KB
-
Sample
230728-ty4ctaec58
-
MD5
5f25397473870629f943edcc0b137281
-
SHA1
368474f6392f0547bc02b138fe199a7b005d0122
-
SHA256
03dbbb05e1588d2303720a4edfb8cb0c6dfef922b85ed66d43b67cde6bc68c3e
-
SHA512
de326d719bb44fade2693afbdf79b8f89a38f4405eadf087bf75a049af27195cda9b8b2b1bae0c254d7202f3f2539217201389135b5255584e16ecb8eb6af1e7
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4v2AsbhS6FiAxDeebdyb8e1m/i:joZtL+EP8v2AsbhS6FiAxDeeb4h
Behavioral task
behavioral1
Sample
Ice.exe
Resource
win7-20230712-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1134522402752172043/8EJp_9pCTCvpuTgMYBDcd2nuK13GxYf4SCK7CGg_sajnsqKTxj4pixGeImKdnzXQGR7M
Targets
-
-
Target
Ice.exe
-
Size
228KB
-
MD5
5f25397473870629f943edcc0b137281
-
SHA1
368474f6392f0547bc02b138fe199a7b005d0122
-
SHA256
03dbbb05e1588d2303720a4edfb8cb0c6dfef922b85ed66d43b67cde6bc68c3e
-
SHA512
de326d719bb44fade2693afbdf79b8f89a38f4405eadf087bf75a049af27195cda9b8b2b1bae0c254d7202f3f2539217201389135b5255584e16ecb8eb6af1e7
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4v2AsbhS6FiAxDeebdyb8e1m/i:joZtL+EP8v2AsbhS6FiAxDeeb4h
-
Detect Umbral payload
-