General

  • Target

    f867a240eab1d2993a2a0917e1ba63d9156e66ad637d0a500afc0347c5172075

  • Size

    232KB

  • MD5

    d534b7ce43629032d053b5c88122e761

  • SHA1

    161b697296b3225d2e0116729e3f493660a48196

  • SHA256

    f867a240eab1d2993a2a0917e1ba63d9156e66ad637d0a500afc0347c5172075

  • SHA512

    ffbbe9f7f4890c4f9b17142a81a5b724a15373a6fab89bf46a2e28068c89b96cec0cebaf4248ff10b21c826f003c6090aeea7fc80f42137961f3efb7cd708f15

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD4OnhUsyVtGdTOMdRYQMWb8e1mLeqi:DoZtL+EP8OnhUsyVtGdTOMdRYQHdP

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1255170369241874474/nLCkKrU2TZdzc2UskGyF2__QGRfs9GisPj5UhmiVTh71Fb7bgGEPnaS1YMyVE7N38Xic

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f867a240eab1d2993a2a0917e1ba63d9156e66ad637d0a500afc0347c5172075
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections