General

  • Target

    KatanaBeta.exe

  • Size

    229KB

  • MD5

    f6f744441dfded289e9f80124b42cd7b

  • SHA1

    e097b009936023a9f7672bc1fb956ad45a07e9ad

  • SHA256

    a6691d55b146c79be7721277050c0f6c11130fa826cda7d78a4d529afefe3221

  • SHA512

    4cfec12b594cad710954dc25dee05b185c4917640d6ccd3778487a40ee73b0d08bc7cdd8787b2a9d331783d3de9d52535f8ed73b82a2de22331e4b81b49b1e6d

  • SSDEEP

    6144:FloZM3fsXtioRkts/cnnK6cMl8Eru0ad1+t7mEl5Q77b8e1mCSni:HoZ1tlRk83Ml8Eru0ad1+t7mEl5QTQi

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1267710453140951191/IIRxpE0xbpWEQdtzIur3qQkpJXN_Y7Z0eY8h8JOoQYGP2oBxcIKX2ZtY3K4AB1WZ5D5d

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • KatanaBeta.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections