Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win7-20240708-en
General
-
Target
Umbral.exe
-
Size
229KB
-
MD5
47a00d21a6b9b87b9ff9d9190d820531
-
SHA1
f70756addfdffe4333ea2811233c15c3923a3a2f
-
SHA256
3fc208899b7c2f6208b31ead1b538808dac5fbcc79de62ca867ee0f27064e6ac
-
SHA512
b9cbcf10cd9024449524a3554f37cf73bbdf9c983a7c2cfe605eb581902eb9c7e450277e9d627607c2ad369fd415ec141109559a3371198d5ee0a37d2d21a2cc
-
SSDEEP
6144:lloZMLrIkd8g+EtXHkv/iD4lAMc1aYe5xyRXKYZd8l0b8e1maqvRei:noZ0L+EP8WMc1aYe5xyRXKYZd8WJqvRT
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1260936672724385829/8zvimZzQuHtU4AEMjra0gNXPNmEl8F0OXX5Y66cA5fxhOuePu2AFpfI5VOJ7uiyNYne5
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Umbral.exe
Files
-
Umbral.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ