General
-
Target
Voxiom.io Loader.zip
-
Size
141KB
-
Sample
231002-26k57sgh79
-
MD5
ef56f0e19e96b9da01ca5f463d0806ec
-
SHA1
dc5facbdf1ba40a99c7f1e7776a33c05c6598316
-
SHA256
fdaf5bca3b3bad4071595db5558a1c2e927e7c6e822030d37f13a861adfee77d
-
SHA512
d4bc28261edb09b0aa558a1eba3961193076c42d4ff7aadc545847366b6a6617275b30118303e0f9acc5e4d6289836d96c43dd0c3f1bb649cbfe4d6406805ad4
-
SSDEEP
3072:ctE1syfrh2/9CRZiuTwRGjLEcYEUkaEt/pGaghfRNJHcRzhl/:cilIVCLylk9/4agh1HcR9p
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1158524014961111142/-VPn4v1yBepEWZwAJNhu7Jx3WfJFd5I-E4UpnmpC1VZOOQa7-MmG4YDnlX0EK-pxyOKf
Targets
-
-
Target
Voxiom.io Loader.exe
-
Size
279KB
-
MD5
c697c89b329c3d9061aa0ac730aa9d97
-
SHA1
7da83b25b7eb028c4b624a14e46b129735e7caf7
-
SHA256
d290b7546f6f9df3320d4b2421a42aaa8e45792be5f4865f17df2d0844ae97ec
-
SHA512
fbe7976ded8a7e7919158f54a0b03dfddf83afc210e5b0958afb0cab5ccaee64d886b2d67f396a5d67526684ba176da4239bf1b95d891322e2c80114a52d80d8
-
SSDEEP
6144:oloZM+rIkd8g+EtXHkv/iD4WFHHQ2U7X8ktoGnnGm4b8e1mkix4aghFHcR9:2oZtL+EP8+HHQ2U7X8ktoGnnGnS+ag/
-
Detect Umbral payload
-