General
-
Target
PeerDistAD.exe
-
Size
229KB
-
Sample
240315-1k6dksbg91
-
MD5
afa8bb7e6708d4b5c056079f642b65f9
-
SHA1
3cadcd7a2da0bc26fd7912f46bdc692e51752913
-
SHA256
9041042642f5c0b67443490fc595aaaa1858c3a8582602969f1af568cad398e9
-
SHA512
46392d04c3827a9f1602685bae2b10a69306839ce3af5b51889a70925e48654e0b8793ae4f68a4ce94f7c7dc71d0d69f0437583417b32cef9619024294351ed4
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4Z/kJ2U7X8+toGnnGr8+cI8e1mAi:noZtL+EP8Z/kJ2U7X8+toGnnGr8S6
Behavioral task
behavioral1
Sample
PeerDistAD.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1218255752314097764/pf1l_fyX4Y944q-tMNsmbSq2cfDBpqCBXuTvF0vyF76tkTcn3FOYasjrq_iM6NffJOYF
Targets
-
-
Target
PeerDistAD.exe
-
Size
229KB
-
MD5
afa8bb7e6708d4b5c056079f642b65f9
-
SHA1
3cadcd7a2da0bc26fd7912f46bdc692e51752913
-
SHA256
9041042642f5c0b67443490fc595aaaa1858c3a8582602969f1af568cad398e9
-
SHA512
46392d04c3827a9f1602685bae2b10a69306839ce3af5b51889a70925e48654e0b8793ae4f68a4ce94f7c7dc71d0d69f0437583417b32cef9619024294351ed4
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4Z/kJ2U7X8+toGnnGr8+cI8e1mAi:noZtL+EP8Z/kJ2U7X8+toGnnGr8S6
-
Detect Umbral payload
-