Behavioral task
behavioral1
Sample
Katana Cod/KatanaBeta.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Katana Cod/Key.bat
Resource
win11-20240802-en
General
-
Target
Katana Cod.zip
-
Size
230KB
-
MD5
a389ce9a2572a8eed2b7800ba5b34a6e
-
SHA1
27cd21988ae7c5c16ce6a0320253766881180de9
-
SHA256
92b29151b184cbbc1227cdf1fec858cb8145d5f03516b9199dba669dae30f6b8
-
SHA512
d9f5a88362e9276786f56ccd93a8b3d9d3138a240b12025b68c7b8af00eee02bd28b24b1ab16e266e4330becf594b9ecd0ca8b99c9fe80db6fb91efe3537a926
-
SSDEEP
6144:TloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSniB:RoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQiB
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1267710453140951191/IIRxpE0xbpWEQdtzIur3qQkpJXN_Y7Z0eY8h8JOoQYGP2oBxcIKX2ZtY3K4AB1WZ5D5d
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule sample family_umbral static1/unpack001/Katana Cod/KatanaBeta.exe family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Katana Cod/KatanaBeta.exe
Files
-
Katana Cod.zip.zip
-
Katana Cod/INSTRUCTIONS.txt
-
Katana Cod/KatanaBeta.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Katana Cod/Key.bat