General

  • Target

    e6d228a2a4610cb3d21b4cc965223f5f4c98e40263c71d0307e6dc4a693512ec

  • Size

    234KB

  • MD5

    4de282f3a3d77c0b217fa45c09454d22

  • SHA1

    bdf07d339f21217ae5acfcce83bcc04ac1037134

  • SHA256

    e6d228a2a4610cb3d21b4cc965223f5f4c98e40263c71d0307e6dc4a693512ec

  • SHA512

    2b58af8a8b1ed2328c100dc9f7665e26c08c3b586079f736255003f3a1a503d6ba97a4040168c5da4d6998d0d2ed81735b74d73958e9baeef361d97559c701fa

  • SSDEEP

    6144:1rQHIw0YRt+1SHkekkngPBJW8e1mhNax:1QP+2nfC0x

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1285972781925798132/nBZqbxL73TFbSYajVgbmW6KAjmyusRbWfByPMvZHMnjHAVPOWVCXCxCsfk91nafH1Gby

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e6d228a2a4610cb3d21b4cc965223f5f4c98e40263c71d0307e6dc4a693512ec
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.