General

  • Target

    435a2c3b87a6d4e96690d2aae112660823dc52740222c85a80e5f01e9910ee92

  • Size

    231KB

  • MD5

    3b915b9bbc5ddf429f85bf939febe424

  • SHA1

    2278baaf3764a27bc962de75601f4d49b2191592

  • SHA256

    435a2c3b87a6d4e96690d2aae112660823dc52740222c85a80e5f01e9910ee92

  • SHA512

    d83341bf784bed732bf120299824ea066f66f505b6dd0fb0b84396af34877a1ba0c483c805835179be2463dd34503b31260035e78f47ca1396305f60f2be50ed

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD4LmfzMOsTPkPFQu//OPub8e1mt6i:DoZtL+EP8LwzMOsTPkPFQu//OKO/

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1285740646597922817/JzkdWV_susRrZmH9kMV_cDF9XoYZDy-wrySe9jVqGNwW3dOIhx6NW9DtmzGED4W8cpWh

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 435a2c3b87a6d4e96690d2aae112660823dc52740222c85a80e5f01e9910ee92
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.