General
-
Target
log.exe
-
Size
227KB
-
Sample
240326-z62f3scf27
-
MD5
6f38d62a2d7181a1572e956335e8dd32
-
SHA1
a530f62073d14fa589bd3ea1309975bb4e19d2b3
-
SHA256
41bd71f64646577e8e4fc79614529ce08ab74dd5c8a67ccafbd46509e0b6bfa0
-
SHA512
b688682e879e715ffcc0f98c041cb0ee23de19410843cf755d39754d71c256128bcbe6f3b18cbd33eb16fa762effb03f9ae18e9cf2b8944a826fc313bad4ff6f
-
SSDEEP
6144:+loZMzrIkd8g+EtXHkv/iD4ll7E9cCFdWLj+ctBIZDb8e1m3i:ooZcL+EP8ll7E9cCFdWLj+ctBItt
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1214186996637892609/KpC5zx_QLZxD5Fxf1eyiWZprrWQu8FDWivS4iGixVrZDTQigH_QQFQj30smxiveXV-mL
Targets
-
-
Target
log.exe
-
Size
227KB
-
MD5
6f38d62a2d7181a1572e956335e8dd32
-
SHA1
a530f62073d14fa589bd3ea1309975bb4e19d2b3
-
SHA256
41bd71f64646577e8e4fc79614529ce08ab74dd5c8a67ccafbd46509e0b6bfa0
-
SHA512
b688682e879e715ffcc0f98c041cb0ee23de19410843cf755d39754d71c256128bcbe6f3b18cbd33eb16fa762effb03f9ae18e9cf2b8944a826fc313bad4ff6f
-
SSDEEP
6144:+loZMzrIkd8g+EtXHkv/iD4ll7E9cCFdWLj+ctBIZDb8e1m3i:ooZcL+EP8ll7E9cCFdWLj+ctBItt
-
Detect Umbral payload
-