General
-
Target
WindowsCRPT.exe
-
Size
236KB
-
Sample
240624-sl24jsscjn
-
MD5
912f84739a9dc20a49c99def03e5551d
-
SHA1
716bfd7315d148975a5d24327e1895ec86bec7aa
-
SHA256
c0cee96676148e2736894cbf46345436be05fb126a4f0c32ff74c74de053b28d
-
SHA512
1804d41780ec0d42e2caee8116e574b593a10c75e585e45666c3b18c2c147644bf2ac218b404dcc6648fbe06a4e82e3bbd328df782069cd6daee4be4c1c9c5ff
-
SSDEEP
6144:BloZM+rIkd8g+EtXHkv/iD48KlH3tW+x2kt/qqfKhb8e1mU4iZ:zoZtL+EP88KlH3tW+x2kt/qqfirBZ
Behavioral task
behavioral1
Sample
WindowsCRPT.exe
Resource
win7-20240220-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1248706225861034025/ZPwpfqpVEK5LRX_w0PuLTXb10jVGB00cMU94TMc_QZG6Sh-yfs7IhA9DHkax00Lk8v-n
Targets
-
-
Target
WindowsCRPT.exe
-
Size
236KB
-
MD5
912f84739a9dc20a49c99def03e5551d
-
SHA1
716bfd7315d148975a5d24327e1895ec86bec7aa
-
SHA256
c0cee96676148e2736894cbf46345436be05fb126a4f0c32ff74c74de053b28d
-
SHA512
1804d41780ec0d42e2caee8116e574b593a10c75e585e45666c3b18c2c147644bf2ac218b404dcc6648fbe06a4e82e3bbd328df782069cd6daee4be4c1c9c5ff
-
SSDEEP
6144:BloZM+rIkd8g+EtXHkv/iD48KlH3tW+x2kt/qqfKhb8e1mU4iZ:zoZtL+EP88KlH3tW+x2kt/qqfirBZ
-
Detect Umbral payload
-