Behavioral task
behavioral1
Sample
382f9d13e5a5945980c767ec1d98732d971a4e07bdb9ed1950d6c455edbb203a.exe
Resource
win7-20240708-en
General
-
Target
382f9d13e5a5945980c767ec1d98732d971a4e07bdb9ed1950d6c455edbb203a.exe
-
Size
296KB
-
MD5
c4cf132278a366635533a2734901aa95
-
SHA1
06ea6b94f8accb59c3115c67208a1116a12a7f1e
-
SHA256
382f9d13e5a5945980c767ec1d98732d971a4e07bdb9ed1950d6c455edbb203a
-
SHA512
d6f4343892a266db8b62892d0c8eef5e63492f49e237d704cf2c5237fe5249f948dbbc8471ae2db00a862af9d7658c6286a72a0f3134786dae82d5fad72eb120
-
SSDEEP
6144:dloZM+rIkd8g+EtXHkv/iD4PaIWVjgULYyD1Ac5eIb8e1mWiQ:/oZVL+EP8PaIWVjgULYyD1Ac5n0
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1222057832011137064/xHw2NG_dFhYqQKhgRobsja61tNIbEsN8GrE7S4K1SPmpvEek-9MvgREk8PUDX3-FoVeS
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 382f9d13e5a5945980c767ec1d98732d971a4e07bdb9ed1950d6c455edbb203a.exe
Files
-
382f9d13e5a5945980c767ec1d98732d971a4e07bdb9ed1950d6c455edbb203a.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ