General
-
Target
CrxckrInstaller.exe
-
Size
296KB
-
Sample
240301-ylvmcscd7v
-
MD5
dc1210b8ce592d38a6e6bbaac8d3f64c
-
SHA1
8b6ad187ee837db5e924a972943355ed1c82cb7d
-
SHA256
63a623df9e58f6705946b5473ab20fdad8dcdd93800b7ca8351fae0bf5c635ce
-
SHA512
c07c5f4543eb59282333f19c29b6eaaa76f003cb38da03969b7d73b0755619150d0d2b0b5c4bfdd045806e6cf54652ee10262b6aa465bc95b65735cce5ef176d
-
SSDEEP
6144:NloZM+rIkd8g+EtXHkv/iD4Ev9KiAfboixUyzzqtmb8e1mhi:PoZtL+EP8Ev9KiAfboixUyzzqov
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1213210102572515388/dWKjkB5GPb65xfJC99dCVsj3axOYTwZESuaf6k4uSE96uksJNfTHvt4uGxoK8BBhZLyJ
Targets
-
-
Target
CrxckrInstaller.exe
-
Size
296KB
-
MD5
dc1210b8ce592d38a6e6bbaac8d3f64c
-
SHA1
8b6ad187ee837db5e924a972943355ed1c82cb7d
-
SHA256
63a623df9e58f6705946b5473ab20fdad8dcdd93800b7ca8351fae0bf5c635ce
-
SHA512
c07c5f4543eb59282333f19c29b6eaaa76f003cb38da03969b7d73b0755619150d0d2b0b5c4bfdd045806e6cf54652ee10262b6aa465bc95b65735cce5ef176d
-
SSDEEP
6144:NloZM+rIkd8g+EtXHkv/iD4Ev9KiAfboixUyzzqtmb8e1mhi:PoZtL+EP8Ev9KiAfboixUyzzqov
-
Detect Umbral payload
-