General
-
Target
Windows_Office Activator By RXS.bin.zip
-
Size
775KB
-
Sample
231011-p89kcsha3v
-
MD5
c788ac054575d3709b0f592fa400bc7e
-
SHA1
9045270af8716d7724a62b0c5654e6930280a9e3
-
SHA256
369eac068fdcfd38726f9f5ef813f1ddee9ada72ccf1dde4bbc28c908e3cc6d2
-
SHA512
ba5ec4ef8137fa1b62bcca082a8110afaef9f04bdbe40e5d6c5cdb35b4adf5c2fd72b8716f94604474d8114b1bb1238b45fe665c9fb70ff79ee40e9f9eb1a88a
-
SSDEEP
24576:TGqsVdxf6by2mIw9jfT49fib6iReiCXIr8U:Idxb20l26bZlCXO5
Static task
static1
Behavioral task
behavioral1
Sample
Windows_Office Activator By RXS.exe
Resource
win7-20230831-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1155956024495308830/o395pHkaR0VtcxpxF8d-fTNY_r32FGWRVqhqpd3v2J7ysT_PVR1FckU2n2mU2vV4jiQL
Targets
-
-
Target
Windows_Office Activator By RXS.bin
-
Size
779KB
-
MD5
7fc8b5c1779a9aeeecfcb4241e263d00
-
SHA1
e106ecab86ae0aa5fd94bffe49279fe793bb5e2c
-
SHA256
a8f2fe0ab643b948071bdb619fd4579740336e5744bfd4f2aed4c674f7c75f4f
-
SHA512
b99b746339cff5142d504bdeb4551d305034f8463f991100f200f83e10805a79c573a611a4a24558c4c41eab7460f5dafecd40c69fdc32d4c0faefd86285c947
-
SSDEEP
24576:FBuDErbOl69QjPPN15Nxtug2GNqfpcgHN:zuUE6aVNxtlaRc0N
-
Detect Umbral payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-