Behavioral task
behavioral1
Sample
AIMWARЕ.exe
Resource
win10v2004-20240426-en
General
-
Target
AIMWARЕ.exe
-
Size
231KB
-
MD5
6a5855afed7e8dfd5585fb9974325ed4
-
SHA1
ed1d76c631c6f759bafc3ad95d9a44d2aea1421b
-
SHA256
8ab8fc29e1ebd9b904d65813e7b33520a132dbec055d5c4cf8f101f67381174b
-
SHA512
78c96cd5c9121cbcae1963d867182285f0aed92dab17e350c0b268278793370a78cac35de9b0b6014573f9a1d7d19af0a8441037fb43bd90d800775492c91583
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4Nh6KywvrY6hkijD6Hg+lI8e1msAi:joZtL+EP8X6KywvrY6hkijD6d4jZ
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1234186783038767154/bfD8b739yPwVGaoq7IAOBItMUvfGQedSEolOJv2mG5JuLedrXSPNeas8U-wg2Y3P3XBu
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource AIMWARЕ.exe
Files
-
AIMWARЕ.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ