General

  • Target

    virtualVendors.exe.exe

  • Size

    227KB

  • MD5

    807e4614a20cea5b57f1f18d293898b5

  • SHA1

    2bcef1448bd7183916dcb11fb02c724c9b0df178

  • SHA256

    c5aa4106ddb48cfc62a61e2029fb71d43ab83b84fbb5bec35fc677471326fc3d

  • SHA512

    8c155b0950c70d1180d3bc148899b2452e1f69951f0c406e826be4fd9c835b415fa420b3d4f9b05dd1d82c5da9383da881739899902fb13dfe5aacba4e7cd939

  • SSDEEP

    6144:MloZM+rIkd8g+EtXHkv/iD4Yh/khv0IH62PxM4dtUb8e1msi:KoZtL+EP8Yh/khv0IH62PxM4dOK

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1231485093458214982/BBb48zT7ugCAaIOKrv6OBnDJwdlo9SYKRG-GilWGPq51CywezjXRolyG-vq3eLc0gT97

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • virtualVendors.exe.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections