General

  • Target

    GalaxySwapper.exe

  • Size

    230KB

  • MD5

    a559050bd6be1e2a2f6e980db70d89b6

  • SHA1

    fa02028065c65f9961f99a6766a8493f7fc1c279

  • SHA256

    43927b3cb128dd846d6dfee02f7ca6781315a201740720c8f16b4d12161280b0

  • SHA512

    0d6f9d2c1d5fd748f0f202299a8484ade4796a491b047a739cf9c2e4a9c9f9460f524ed4602e6fea3f25537d4908642ffdec3747e2ecd8cd79f3bd8ca645f3c8

  • SSDEEP

    6144:TloZMcrIkd8g+EtXHkv/iD4QKUb/1+mpXsl3ySXq82b8e1mWVpi:RoZzL+EP8QKUb/1+mpXsl3ySXANw

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1264301486398115977/wjglcrDJjuBAHqc9KILC67LHWHbM3-SSom3dRC1HSe92kDoIh6w5g92jTANiDfxCceje

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • GalaxySwapper.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections