General
-
Target
v1.lua.txt
-
Size
73B
-
Sample
231126-q3g4lahf91
-
MD5
788b937bf4db464c2367a0ae621040a5
-
SHA1
446598049f1fd62e83fe65818c521b307d073f12
-
SHA256
c156c2a525dedd8626371d6b8808787209c533147d8f515caa44a97bc95b38d8
-
SHA512
081f0d30ab53ef4689a9cc785ddac0aab330825c7dfbf78d9e187999161dfe26c0dd5eda77070dc3a7e7f1ae5465b6737a297cb843c7043a2a062df4f77b5e80
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1178090943421894717/oiTjFNJzJlZPKQv45vEBY3HwoUJtrV26L9ZwuwlL54qr4SW6mH1ZeHMPKBtP_7sAxEen
Targets
-
-
Target
v1.lua.txt
-
Size
73B
-
MD5
788b937bf4db464c2367a0ae621040a5
-
SHA1
446598049f1fd62e83fe65818c521b307d073f12
-
SHA256
c156c2a525dedd8626371d6b8808787209c533147d8f515caa44a97bc95b38d8
-
SHA512
081f0d30ab53ef4689a9cc785ddac0aab330825c7dfbf78d9e187999161dfe26c0dd5eda77070dc3a7e7f1ae5465b6737a297cb843c7043a2a062df4f77b5e80
-
Detect Umbral payload
-
Executes dropped EXE
-