General

  • Target

    solara3.1.zip

  • Size

    93KB

  • MD5

    067524d2b7c1e7575b1ff841b854e55e

  • SHA1

    2253f3710d8641c262d232dcf31b9e8234c04026

  • SHA256

    2df439e8c9ee999f550f555e938904fcc435aa9836fbb6c962c41d8b99002c50

  • SHA512

    adb6e1dbe47a78e0c828b886a9d34d125e8fb7724d63d27a717fff878b399de12a1ca94d5c9f935c168aead1c0f1bed407e869bca9cab5aa0f85d651463e317a

  • SSDEEP

    1536:nRFNh4zuKupSGyhUnVMaOBNkTCcQ86gAAaV7O6pwK9nTx/nR7sdDHtFo15F8S41y:nnz4nGyhUCa1TS/A266b/nR7SNWd8H1y

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1218996541960753294/boru4OIiPZlcyQ-ZGV0nkmj3mwQ4Plfv_FNHDZjSkufOGGGnNhBMqMsXP44o9KmN4QSW

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • solara3.1.zip
    .zip
  • solara3.1.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections