General
-
Target
puutin.png.exe
-
Size
286KB
-
Sample
240218-lxjb9ahb48
-
MD5
69ae905eb53c2480dbbaeaf0070cf597
-
SHA1
417e12e2cb4a86a1b76c7e4de1eee03aa3c55b91
-
SHA256
41c96abcb552167c939b9f2f08e59d1608a35111dca47ecc14c6b7f7dfa1dcb7
-
SHA512
f2700446ed7b33d233211ff8bb9072e8b78c726ea52b85e7a83ae41c006bae08f571b6f1e56f3397e99bfda7d6e87fcd0664929b80e90a806dac608b832564dc
-
SSDEEP
6144:GloZMCrIkd8g+EtXHkv/iD4hHr0AmB5KP/Cwhl014b8e1mu0i4e+8T:woZZL+EP8hHr0AmB5KP/Cwhl0yX91T
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1194986139333967953/MaUld_ZSZR4-nceYC8ZTjsEVA6kWz0MlrslI1kSyJsiAyXl127esUjR68igwbUBTBGpq
Targets
-
-
Target
puutin.png.exe
-
Size
286KB
-
MD5
69ae905eb53c2480dbbaeaf0070cf597
-
SHA1
417e12e2cb4a86a1b76c7e4de1eee03aa3c55b91
-
SHA256
41c96abcb552167c939b9f2f08e59d1608a35111dca47ecc14c6b7f7dfa1dcb7
-
SHA512
f2700446ed7b33d233211ff8bb9072e8b78c726ea52b85e7a83ae41c006bae08f571b6f1e56f3397e99bfda7d6e87fcd0664929b80e90a806dac608b832564dc
-
SSDEEP
6144:GloZMCrIkd8g+EtXHkv/iD4hHr0AmB5KP/Cwhl014b8e1mu0i4e+8T:woZZL+EP8hHr0AmB5KP/Cwhl0yX91T
-
Detect Umbral payload
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-