General

  • Target

    Eval.gg.exe

  • Size

    231KB

  • MD5

    28aa75839a6f5f64e82139f18dd6331b

  • SHA1

    511fd8d498f9c4e333aa7397ed0f8e26ac7ba159

  • SHA256

    c4943ea4fbfe0cb85961446f99020cd60789b1557f73adb5b5f66b25e936ce69

  • SHA512

    2259e8c91ef2e1a5cd56c77ebe9f8fa6a2071671d9c5447a45e1381abb8498745a63b781510cba1d5de258404a601b5a2742bb4cb6cf3cc69a3c5453cb470564

  • SSDEEP

    6144:hloZM+rIkd8g+EtXHkv/iD4tx/GEKtFuxr20VJgBlb8e1m/3i:ToZtL+EP8tx/GEKtFuxr20VJgzYS

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1283560097590542368/p3Bpyu3RP4hOB9HE7uZFW3RadScsxcJNQOC60HNfQx2Rpx_4r4atEvIKpOvtUIrJsDaW

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Eval.gg.exe
    .exe windows:4 windows x86 arch:x86

    Password: 123

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections