Behavioral task
behavioral1
Sample
2236-0-0x0000000000400000-0x000000000084E000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2236-0-0x0000000000400000-0x000000000084E000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2236-0-0x0000000000400000-0x000000000084E000-memory.dmp
-
Size
4.3MB
-
MD5
dc27016686c00b75a6c7506693116612
-
SHA1
de5b47e772e47273225ba74bea579f81684dc136
-
SHA256
4335476ed096e44268aeb9df0f04bff7e8e7c6117d6914c9476880bb8d071ad4
-
SHA512
18fc3a722a4a1236aa79026c4f46f19c0d5826f9f6401aa0c63a5257579de0a26e6d2963fbd13e87eb31944c4f400a8296391f2c5fddc80ee81a826e71050cc1
-
SSDEEP
98304:vPbJ4B/qiKgVU8t/CzhQ+gWS2o7L8iVvIvQ:394BCiK/8t/CzhVH4PFVp
Malware Config
Signatures
-
resource yara_rule sample dcrat -
Dcrat family
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2236-0-0x0000000000400000-0x000000000084E000-memory.dmp
Files
-
2236-0-0x0000000000400000-0x000000000084E000-memory.dmp.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ