General
-
Target
log.exe
-
Size
227KB
-
MD5
6f38d62a2d7181a1572e956335e8dd32
-
SHA1
a530f62073d14fa589bd3ea1309975bb4e19d2b3
-
SHA256
41bd71f64646577e8e4fc79614529ce08ab74dd5c8a67ccafbd46509e0b6bfa0
-
SHA512
b688682e879e715ffcc0f98c041cb0ee23de19410843cf755d39754d71c256128bcbe6f3b18cbd33eb16fa762effb03f9ae18e9cf2b8944a826fc313bad4ff6f
-
SSDEEP
6144:+loZMzrIkd8g+EtXHkv/iD4ll7E9cCFdWLj+ctBIZDb8e1m3i:ooZcL+EP8ll7E9cCFdWLj+ctBItt
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1214186996637892609/KpC5zx_QLZxD5Fxf1eyiWZprrWQu8FDWivS4iGixVrZDTQigH_QQFQj30smxiveXV-mL
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource log.exe
Files
-
log.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ