General

  • Target

    0c6f57e34c60e926869925974c0ba0c6.bin

  • Size

    89KB

  • MD5

    30301cfd31e65640329de95984022f51

  • SHA1

    bd7bde87004e7291ac1625f1533c616c4b6fc97a

  • SHA256

    1ea8814db986f6d071798b5d8087d4816ce27120543d3460ffc21afa07499ecc

  • SHA512

    4fe3c7b89e98c7ee898075004e095a99cc5d9c47639223313df5e905519e87e8678a6988578319f68a16a4ad53ded993688ff2d70e24dcedcbcab2e0af39089a

  • SSDEEP

    1536:BTK7U7yDPiV0sUOAJ67uPdYrG4YJzgTjiZ8Hka71soBv0j3Pa22Xnr4L/3c4CTjR:BTKI7RTY6SPdYi4YJzedmNjHaQk4Cz

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1143115606330200074/pyKgc8H0hMiolN7TnRv_a5UZxMEV9hMyMPcyMEE79xLCjkKRbFA2ce8qYJuxmfb_M-83

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 0c6f57e34c60e926869925974c0ba0c6.bin
    .zip

    Password: infected

  • 3818bc71c250768baec123373d2e873428509f7dcef12a56f4d428d488661c71.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.