General
-
Target
aa.exe
-
Size
1.4MB
-
Sample
240601-pzxt7sdd64
-
MD5
de2363f6703a0bf9383d60ab1bd4f373
-
SHA1
aaa94c5937f11dbb8d376d94f142986e228f9bb8
-
SHA256
53d7972fc0f8be77d6f3b16368a97f76a50149bc91a448213ddae10b87776efa
-
SHA512
f01a6cfeb385560544704e040d07c741349a7d4d3a7ab040bd4eb306a266ba1f17ce48a8c004682e49fbc1aea0500a93f22e19e1e500b1e202e2a99ec46d4d74
-
SSDEEP
24576:jYpTWxGrMKFRVWWsEf7YpTWxGrMKFRVWWsEf:OZFjVvWZFjVv
Static task
static1
Behavioral task
behavioral1
Sample
aa.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1246442211583721583/3YpYr6AH1dCtDLZ01gRLybHtJudQKA33WgcrTAmy6OQgEdbJLReBBaWEGGJ6doJ140k2
Targets
-
-
Target
aa.exe
-
Size
1.4MB
-
MD5
de2363f6703a0bf9383d60ab1bd4f373
-
SHA1
aaa94c5937f11dbb8d376d94f142986e228f9bb8
-
SHA256
53d7972fc0f8be77d6f3b16368a97f76a50149bc91a448213ddae10b87776efa
-
SHA512
f01a6cfeb385560544704e040d07c741349a7d4d3a7ab040bd4eb306a266ba1f17ce48a8c004682e49fbc1aea0500a93f22e19e1e500b1e202e2a99ec46d4d74
-
SSDEEP
24576:jYpTWxGrMKFRVWWsEf7YpTWxGrMKFRVWWsEf:OZFjVvWZFjVv
-
Detect Umbral payload
-