General

  • Target

    Auora.exe

  • Size

    231KB

  • MD5

    a96e98be73b7840e10e039d7b3b2a72a

  • SHA1

    bde4c46b9a32ba14aafe652ebe14cb03ba2692a8

  • SHA256

    886a78f6d4a3bb1667c7d8ba553487a9d42fc38188253d3604cfe5c0743b636b

  • SHA512

    c4855010f4b9bf3c0d3f2b78447380d0f85ed440355ed0ed39f10727b44d555f1a7b9ae3a6d241f313d85fa8f052692c20149ecb5b4f6b841291a3f12651ced7

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD4yr5ClW8e1mzi:DoZtL+EP8VCv

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1231285868673761290/A7kDRsbI6W0T22kX0NRWAvj7IvcP_OfFLnEcTAyyedJeT5cv_F3b9okZKA1DXQqGq_CO

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Auora.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections