Behavioral task
behavioral1
Sample
d3ccce85ce8dfc4087cca43248f44920N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3ccce85ce8dfc4087cca43248f44920N.exe
Resource
win10v2004-20240802-en
General
-
Target
d3ccce85ce8dfc4087cca43248f44920N.exe
-
Size
394KB
-
MD5
d3ccce85ce8dfc4087cca43248f44920
-
SHA1
547a8a789d9167946b5e80a1123ff0aedd04be37
-
SHA256
d87db916c3d491a3616f4db964b0af304b44e82240508aae6cf0616939cc937f
-
SHA512
5b025da2ad754d4e95a9d3ca58af01fc666c7350056e92d781cfbf5c76d19eaebecef3bcc4c2fd2c05ae55f9c71581d39f6b57869c22897bf516c99f4a908e8d
-
SSDEEP
6144:YloZMArIkd8g+EtXHkv/iD4BAHCtxdc8e1mQCiNUhcX7elbKTuq9bfF/H9d9n:GoZHL+EP8y2xw5XN3X3uO
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1272664137763393670/JPb5q1OpnwuHleFJcm8agYhCNooeHlNojD8boHLf9oz1TIRIZ19Jz1eiAMETB0SUKNAS
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3ccce85ce8dfc4087cca43248f44920N.exe
Files
-
d3ccce85ce8dfc4087cca43248f44920N.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ