General
-
Target
s.exe
-
Size
87.6MB
-
Sample
240130-yek5cachdr
-
MD5
f93ef549ba0f00e0a73ca814059e0103
-
SHA1
8aafb3809cbdee022ec6d4a735788acc8f3e798f
-
SHA256
b043adb2fe7b0175cc5a83133de3f91c9fcb18c3899566556167b20ad7525961
-
SHA512
b0bbf622fd6096bfa7436ae9703a98729812a6988d7c44f89e49729bacd020e715970507d454f720d42e0e1b0c0f0a5b5f3c90026134a5ecf2050825c942e626
-
SSDEEP
1572864:IOLPYmqSiUpFeBrNGpZ7HWdAB7BWFtvIssO9YaqQnqo2ZbhJEw+Jaa:IodqXUpFe5NOWACIw5tgZFJW8
Static task
static1
Behavioral task
behavioral1
Sample
s.exe
Resource
win10-20231215-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1201223035659759758/D9jpWbZ96iiho5Ap1MRzbzaj6nzawAbRIN0vFZHs3kIfLj8Fkes9NpntqMGdoyLJRKwm
Extracted
discordrat
-
discord_token
MTE5MjA1NDYzMjQ3MDU0NDQzNA.GNEfe8.n8oPT8-5yxOCxz-kqIP5BZC7OkrQBAftptETH4
-
server_id
1150088366382121101
Targets
-
-
Target
s.exe
-
Size
87.6MB
-
MD5
f93ef549ba0f00e0a73ca814059e0103
-
SHA1
8aafb3809cbdee022ec6d4a735788acc8f3e798f
-
SHA256
b043adb2fe7b0175cc5a83133de3f91c9fcb18c3899566556167b20ad7525961
-
SHA512
b0bbf622fd6096bfa7436ae9703a98729812a6988d7c44f89e49729bacd020e715970507d454f720d42e0e1b0c0f0a5b5f3c90026134a5ecf2050825c942e626
-
SSDEEP
1572864:IOLPYmqSiUpFeBrNGpZ7HWdAB7BWFtvIssO9YaqQnqo2ZbhJEw+Jaa:IodqXUpFe5NOWACIw5tgZFJW8
-
Detect Umbral payload
-
Enumerates VirtualBox DLL files
-
Executes dropped EXE
-
Loads dropped DLL
-