General

  • Target

    SolaraB.exe

  • Size

    229KB

  • MD5

    48baa0394f0e53ec2e19d99a3b98a400

  • SHA1

    723638a8779f3ed8d195fdc1af92bd2036ec1ca6

  • SHA256

    186b386185fc93d31a827f9a711ceb0134e85cd91acf0d8b622b891bda751e79

  • SHA512

    eeab39f6d51059f79d0372cd0b1c2197ac08f53a94068b070a63c28344a92e8d4f521e6b0f0a172e950fcbd17c22a707a7d0cbad3209669b868822651b023c53

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4G//Hdtxd38e1m+Ji:noZtL+EP8ovnxZe

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1261975574994358322/t7Wb9RVyFWem2P4CyLnAxqjaasqdLq2_609gWzc5jJtyvXqVdwYJFdYrwDHN2wbAvuFH

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SolaraB.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections