General
-
Target
ae1d6b818db2e9097ca27a9ebdc79ac9f1ac6904305416cc20b0dd532c1fe4bf
-
Size
6.5MB
-
Sample
240611-cagepszckd
-
MD5
332ba662e3c3f073ae86fee29789571d
-
SHA1
5901a5ef0817d5e56f54b4d2a4385717a1b21975
-
SHA256
ae1d6b818db2e9097ca27a9ebdc79ac9f1ac6904305416cc20b0dd532c1fe4bf
-
SHA512
8a00f9595aa18ec77b268a4b3d37888ddb45fd567a09597f5bd369f767f7a5003784606ecc92943a1f8b02d2ae9afa8cc9b99e40d8f03f9aaef2c511cac4845b
-
SSDEEP
196608:o4hV+n8bqD6SiCwDYHLiOYf6OQlmfVuwcP/OCw3P:o4Xc8bqD6SDkhamfVuwcP/jQ
Static task
static1
Behavioral task
behavioral1
Sample
ae1d6b818db2e9097ca27a9ebdc79ac9f1ac6904305416cc20b0dd532c1fe4bf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae1d6b818db2e9097ca27a9ebdc79ac9f1ac6904305416cc20b0dd532c1fe4bf.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1240053523601690654/qfHBS3pgxWWBBKRxgQoR2nk1l0xj4MzBSYbqOqyW4FoI1DOOuzXnQta5yMql-1kPExM_
Targets
-
-
Target
ae1d6b818db2e9097ca27a9ebdc79ac9f1ac6904305416cc20b0dd532c1fe4bf
-
Size
6.5MB
-
MD5
332ba662e3c3f073ae86fee29789571d
-
SHA1
5901a5ef0817d5e56f54b4d2a4385717a1b21975
-
SHA256
ae1d6b818db2e9097ca27a9ebdc79ac9f1ac6904305416cc20b0dd532c1fe4bf
-
SHA512
8a00f9595aa18ec77b268a4b3d37888ddb45fd567a09597f5bd369f767f7a5003784606ecc92943a1f8b02d2ae9afa8cc9b99e40d8f03f9aaef2c511cac4845b
-
SSDEEP
196608:o4hV+n8bqD6SiCwDYHLiOYf6OQlmfVuwcP/OCw3P:o4Xc8bqD6SDkhamfVuwcP/jQ
Score10/10-
Detect Umbral payload
-
Detects executables attemping to enumerate video devices using WMI
-
Detects executables containing possible sandbox analysis VM names
-
Detects executables containing possible sandbox analysis VM usernames
-
Detects executables containing possible sandbox system UUIDs
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-