General

  • Target

    CrxckrInstaller.exe

  • Size

    296KB

  • MD5

    dc1210b8ce592d38a6e6bbaac8d3f64c

  • SHA1

    8b6ad187ee837db5e924a972943355ed1c82cb7d

  • SHA256

    63a623df9e58f6705946b5473ab20fdad8dcdd93800b7ca8351fae0bf5c635ce

  • SHA512

    c07c5f4543eb59282333f19c29b6eaaa76f003cb38da03969b7d73b0755619150d0d2b0b5c4bfdd045806e6cf54652ee10262b6aa465bc95b65735cce5ef176d

  • SSDEEP

    6144:NloZM+rIkd8g+EtXHkv/iD4Ev9KiAfboixUyzzqtmb8e1mhi:PoZtL+EP8Ev9KiAfboixUyzzqov

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1213210102572515388/dWKjkB5GPb65xfJC99dCVsj3axOYTwZESuaf6k4uSE96uksJNfTHvt4uGxoK8BBhZLyJ

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • CrxckrInstaller.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections