Behavioral task
behavioral1
Sample
Eval.gg.exe
Resource
win7-20240903-en
General
-
Target
Eval.gg.exe
-
Size
231KB
-
MD5
28aa75839a6f5f64e82139f18dd6331b
-
SHA1
511fd8d498f9c4e333aa7397ed0f8e26ac7ba159
-
SHA256
c4943ea4fbfe0cb85961446f99020cd60789b1557f73adb5b5f66b25e936ce69
-
SHA512
2259e8c91ef2e1a5cd56c77ebe9f8fa6a2071671d9c5447a45e1381abb8498745a63b781510cba1d5de258404a601b5a2742bb4cb6cf3cc69a3c5453cb470564
-
SSDEEP
6144:hloZM+rIkd8g+EtXHkv/iD4tx/GEKtFuxr20VJgBlb8e1m/3i:ToZtL+EP8tx/GEKtFuxr20VJgzYS
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1283560097590542368/p3Bpyu3RP4hOB9HE7uZFW3RadScsxcJNQOC60HNfQx2Rpx_4r4atEvIKpOvtUIrJsDaW
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Eval.gg.exe
Files
-
Eval.gg.exe.exe windows:4 windows x86 arch:x86
Password: 123
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ