General
-
Target
bulder.exe
-
Size
228KB
-
Sample
240323-yjz43abe96
-
MD5
d8de90f21ece872c78887d8532bc4724
-
SHA1
8abf63837160fe18efb7629ed630402cf9bcb361
-
SHA256
11e06b3c4301175f96442f0295d9dfade52bf2e9712d2a84da3c54d4d4dd47b9
-
SHA512
1c02c2560f8a198b0cea474a0b90ef9b5050a3ccbb242ed1600ddf149bb4166a85d69a66622b07884f4ad59e3da447b74e1682f9376ea8d1a54ae48c2776bc49
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4F9KUw2xpaAPyAxVkjab8e1mci:DoZtL+EP8F9KUw2xpaAPyAxVkyG
Behavioral task
behavioral1
Sample
bulder.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1211695583761408050/M3sBx75jnQ4OpdtOFVzvJ-JieS2qJbDuqhX6C2TEnMLmcYoKAYIyrKhhV1GYBHRI53rX
Targets
-
-
Target
bulder.exe
-
Size
228KB
-
MD5
d8de90f21ece872c78887d8532bc4724
-
SHA1
8abf63837160fe18efb7629ed630402cf9bcb361
-
SHA256
11e06b3c4301175f96442f0295d9dfade52bf2e9712d2a84da3c54d4d4dd47b9
-
SHA512
1c02c2560f8a198b0cea474a0b90ef9b5050a3ccbb242ed1600ddf149bb4166a85d69a66622b07884f4ad59e3da447b74e1682f9376ea8d1a54ae48c2776bc49
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4F9KUw2xpaAPyAxVkjab8e1mci:DoZtL+EP8F9KUw2xpaAPyAxVkyG
-
Detect Umbral payload
-