General
-
Target
idk2.exe
-
Size
235KB
-
Sample
240229-egtpqacg4z
-
MD5
ce4b4e4821aba2f7ea9aad57e60f9c3c
-
SHA1
1f01a2d44d06ced9373687ae061f81540fa1c015
-
SHA256
8d612921eca9c96803b1057e860d2d3236869bd3658b01fb7f3402134bd0300c
-
SHA512
727a3cc82dfdaede3fdcab6bd1a52794e90e3a41560345cc82212aaf75a00a09d63c753cf23b5318ad5b58126f29696bc4fbffac4f9ea1eee0af195712dae085
-
SSDEEP
6144:waeJtRSyn/TlQ1VFmqGF3+re5d0KkJ4tWDwp:wNPT/xAVPWUG0KkrD
Static task
static1
Behavioral task
behavioral1
Sample
idk2.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1205352570537775114/0TwopxZF8mZAIjdEowRHAiTqFbB8pjE6dzR2ST_E7pX5YXnZRcMh5QKMfo2QE94dAXKK
Targets
-
-
Target
idk2.exe
-
Size
235KB
-
MD5
ce4b4e4821aba2f7ea9aad57e60f9c3c
-
SHA1
1f01a2d44d06ced9373687ae061f81540fa1c015
-
SHA256
8d612921eca9c96803b1057e860d2d3236869bd3658b01fb7f3402134bd0300c
-
SHA512
727a3cc82dfdaede3fdcab6bd1a52794e90e3a41560345cc82212aaf75a00a09d63c753cf23b5318ad5b58126f29696bc4fbffac4f9ea1eee0af195712dae085
-
SSDEEP
6144:waeJtRSyn/TlQ1VFmqGF3+re5d0KkJ4tWDwp:wNPT/xAVPWUG0KkrD
-
Detect Umbral payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-