General

  • Target

    Solara.exe

  • Size

    253KB

  • MD5

    9f3f506175ad4d9550bf1aea609694a7

  • SHA1

    6cc35e30d5b40eb1b5d115feec12ec247a84193f

  • SHA256

    7103785c72f15bc66849b927bb9b0030c2a8383a8f71cd4308b0b42055d8d467

  • SHA512

    b4a691e3b679dac187f1219cff013d3e27a87d55bf10c4744b8aba969a0caac39922dbbf9bce454b87e3e685f5bfa9043ecabacca090650278ab2d081bc2d5cb

  • SSDEEP

    6144:NloZM+rIkd8g+EtXHkv/iD4tTXCl38e1m2i8nUJfEm:PoZtL+EP8kda4mfE

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1260178339398684763/vrimjbksRiAdnQJhpf4RiMhDKhDPxfoJKYZ-ILxv3PIxTVVzEhCZeqgCy8f3wVpGOLPx

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections