General

  • Target

    Nowatermarks.temp

  • Size

    229KB

  • MD5

    79d545d3f6a46db17e8dadba1bf623ae

  • SHA1

    f289247a7620ff890ac3d5c87c13445c83b2a02d

  • SHA256

    1e94a2848737d3fe8046f4dabcfe94c250be5085802edce428e4dd271f459a19

  • SHA512

    bd14dec25736a52f79f8b9e4aede9981ffca9ff78e2dbca875802eff7525495a17c506c69b74b572c5e18aca2c7df05b11adaa1160a65f9e2df1f4e8b5b1f447

  • SSDEEP

    6144:lloZMrrIkd8g+EtXHkv/iD4ITZHR/k4XSG/BcoNTo6lm8e1mCKi:noZcL+EP8QZHR/k4XSG/BcoNVSHv

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1271195767931146271/iNqcQXHndflroU3wKuHImLpW56jZ6ZCv7xkqHYGTn6YCeSATY-dipTigRMDm-yI4L0v7

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Nowatermarks.temp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections