Behavioral task
behavioral1
Sample
Exoticgen.exe
Resource
win7-20240705-en
General
-
Target
Exoticgen.exe
-
Size
235KB
-
MD5
099c16c602df2d705c4f68add9f4dcd7
-
SHA1
a35dfa3f01bef023bd4170cf1c71099f259bc65d
-
SHA256
3a01df550a7bbde4061d91acf6641acad0821c5005bb10c37a659493a1f69f6d
-
SHA512
9055442927d4815a9d584b6881806aa2dded35cc679abf023cc9129efbd499457cc9e184f0f675431134651934984f8fda5a597ee74e6074a44b6887c56f777f
-
SSDEEP
6144:jloZM+rIkd8g+EtXHkv/iD41+Ic5nsAvvOXZkQlu+Sb8e1m2i:BoZtL+EP81+Ic5nsAvvOXZkQlupw
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1268287678412099709/Dj10I-JT1wc3TzMxCwDZ914TFiP0ZgKRLH8Cvx8O_wI1ZwXgqie8Nq8vyB2QOhtyingd
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Exoticgen.exe
Files
-
Exoticgen.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ