General
-
Target
test.exe
-
Size
229KB
-
Sample
240211-179phsca6x
-
MD5
389eb7f36e7c17764ad907f4a6ec9903
-
SHA1
c34370beda5170ab51f2dd1d44ec5bcf83559fb4
-
SHA256
c8af26db327c857cc8b739f0fc7a502fed4bf682b6d9e369b3d4f327f89eff90
-
SHA512
4633a433771e8e921968dec9f645497853f5d843e51af335e8247637aa00195613bfb9ba71786a35f531e6a3795aabea9e6ca33ae2abec7d07df0017327597ee
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4S0HULxCqVMQhTuOLueb8e1m8Bi:noZtL+EP8S0HULxCqVMQhTuOLdfY
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20231215-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1206361840754368664/s8nZgox3OELEFxMRDALhFjHqkotlULm5F9_x4Lyvoldn3wl8ev3a0pxmTyzbv7OpHmV6
Targets
-
-
Target
test.exe
-
Size
229KB
-
MD5
389eb7f36e7c17764ad907f4a6ec9903
-
SHA1
c34370beda5170ab51f2dd1d44ec5bcf83559fb4
-
SHA256
c8af26db327c857cc8b739f0fc7a502fed4bf682b6d9e369b3d4f327f89eff90
-
SHA512
4633a433771e8e921968dec9f645497853f5d843e51af335e8247637aa00195613bfb9ba71786a35f531e6a3795aabea9e6ca33ae2abec7d07df0017327597ee
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4S0HULxCqVMQhTuOLueb8e1m8Bi:noZtL+EP8S0HULxCqVMQhTuOLdfY
-
Detect Umbral payload
-