General

  • Target

    payl!@#oad.exe

  • Size

    254KB

  • MD5

    6ad875eb9b33ec6180ddcce0e086593f

  • SHA1

    b2312c14cfc91d9be41b554ab835da009f9674a6

  • SHA256

    6261fb5dbd11f0d7ec140b07a1b82c0609dc27339788cbaf48e611b67a4c1627

  • SHA512

    d39e6b996739973118d7c26bafdeb296aae6ebaffa75ed9ef800832548f94bb804033cec58798ec3e5d3ced3438d361d8e612d5ecd34ca77a2b461de446e2c42

  • SSDEEP

    6144:K4oZoheVHPtHgTIAaZgCwDx7axHU0unC28ejI8G7:xoZ7HPvWCwjXCsIl

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1260197235543773234/M0xJFTUlFiUZgSRMxVmIKUQpN4GPcbXMwy1T9KPRMDbWmwEo7OXoi-p_3CgMj6TQqWBT

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • payl!@#oad.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections