General

  • Target

    9fa6035e3150c3e57724bd3f4f67647ed925c9c9447f00b3df7715d03b6ebf53

  • Size

    234KB

  • MD5

    18a5e3fd22133b48de0ac3ae4e41c997

  • SHA1

    6664c80cf7567077385cc5f82aba04d525a7a8a9

  • SHA256

    9fa6035e3150c3e57724bd3f4f67647ed925c9c9447f00b3df7715d03b6ebf53

  • SHA512

    c359ef3b9b5736b63e8906f6d35e6fb9b6f286f4fd382f5f445f2a5c9e38673a04f90215349c417c19e67cd9e123925521084167ac2dce0af842d18eb3c070b9

  • SSDEEP

    6144:zloZM+rIkd8g+EtXHkv/iD4VsEnYe5xysXKYZd85Wn+l78e1mUDiM:xoZtL+EP8mEnYe5xysXKYZd85zJiM

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1277392669051588690/FA7JPNKgRkIWF6TZtZf-R2-COXm_0RmJgRD2Xg8FbKAIoqjl7PPy7FAMl1QANkBaTKhi

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9fa6035e3150c3e57724bd3f4f67647ed925c9c9447f00b3df7715d03b6ebf53
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections