General

  • Target

    injector.exe

  • Size

    229KB

  • MD5

    2a96f87a14a68baedde5abc5083b0e6b

  • SHA1

    529d56601bd966647ef316ac96a55a8e9afab984

  • SHA256

    02f716c2d57c78804be366f3de719de12217a785f5ddae0102447afe22e2d334

  • SHA512

    a1c80df64149cd717937c898cf470a962678bcd1cc9ba9e88932e45ecf846912d96e60c04c7491a6afe22ac727ab97cc2c798005520540776e5f1695ff2ee832

  • SSDEEP

    6144:9loZM+rIkd8g+EtXHkv/iD4n1cht74szjKrd4UB0Zeb8e1mnuOi:foZtL+EP8n1cht74szjKrd4UBHUuj

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1210655907399209041/YmxX9LV2KMBOVV0sdkDv6q8nLyS4rcxqpWa8iyJIyGBU4gzT8623odOUghGtmjVZbbrM

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • injector.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections