General
-
Target
clean.exe
-
Size
229KB
-
MD5
afc4798057dd3b9a73225e98546c6e72
-
SHA1
af1a74d8c7be3f1f95fd9e7d6ebfad0fdd105645
-
SHA256
ec4b26011b3dbc1ee514189ca764e73ce7c2acc7a7f6e9cfa8190c8151484ab7
-
SHA512
577469a498352b6557941cd9db8ef13711758870b6fa385ae9b9eaec3ad0b786ec6c50a4413d786a75c1af1e5bf3b2673bc8aacb71d539a70ae116ea4bc27ef8
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4lSHJxfEY3umfh8Iti+b8e1m+di:noZmL+EP8lSHJxfEY3umfh8ItZF0
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1233850910241849455/YwI9ixeDGi2xRIP3UmPgFRxqoW4Bu530Wk7lWFd3ryPjMCgvOFBE-AU6ClHOiWyEnMrV
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource clean.exe
Files
-
clean.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ