General
-
Target
PandziakWyszukiwarka.rar
-
Size
78KB
-
Sample
240403-w7gxaahb2s
-
MD5
c9ffb344a69f3784d86d8228800ac325
-
SHA1
a7c82d79f48fd3ae753e8e4243705ee353c80384
-
SHA256
73a5c551293bb5863d0b721b792a38d79202eb86e3319f0742cbbee7340529df
-
SHA512
cc4546682219891922543ffc09a6e20ed9fe0043e39b176f4b44a545550e2800703ff57847d3175f05e3d596243c9a7e3302760c79082cfdfd87912b1bb90690
-
SSDEEP
1536:k4nh9qnkDYMmaxQAccJscBlf8NLA9PeZ+lxLYKsvRjwK9m7FmjOVM:Bnh9jYvuB+NLA9zlhYRvRjwKcFeB
Behavioral task
behavioral1
Sample
PandziakWyszukiwarka.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
PandziakWyszukiwarka.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1225124700347301888/IGR7w5cMi1SqxWS_tfI5lpNKpALm0T3_0tsOE5S9ny9TEzTUV6PnJTsiRfLhvmY4ejrc
Targets
-
-
Target
PandziakWyszukiwarka.exe
-
Size
227KB
-
MD5
778297c513db9d797b7248d086df9961
-
SHA1
b1ab5453c0821d49a7e1769bd9c9d728536efd85
-
SHA256
fac617bf9c4e4640025850beac879d857fd29365b98843c0a33dc2a7ead77a14
-
SHA512
116f43b70a2400ef281f6f8e5ab129a6622eaac945d8fc4a4e765d1cb6b0cfd532d2807e5b496921b36f1692f43e32d3e7d607f4f9e31b7fac787e3aa56d7be7
-
SSDEEP
6144:eloZM+rIkd8g+EtXHkv/iD4u2gBGELnsld42X3Wz9hb8e1m+pi:IoZtL+EP8u2gBGELnsld42X3WDa
-
Detect Umbral payload
-