General

  • Target

    8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874

  • Size

    229KB

  • MD5

    25a2fec95cda41fd3c61d60c94ff3364

  • SHA1

    beaf7f2cac9263de452edd2acf988c7ee80a3b1b

  • SHA256

    8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874

  • SHA512

    30da5918a3afd72ec6f5ff5fb70f4d7c0a4d424f12b1fa1be9453bb8ee8df0cdc89aa05d6202d8392032f2f6e47b2c43ea36e024b0def49ed829bfe10ff2d830

  • SSDEEP

    6144:9loZMjNaK9/gMntXP03fCFZ4HZMs1tGRPAA/NotgKv8eFlLBT:foZwd5n734HZMs1tGRPAA/NpWlZ

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1285678240769245204/Dq6zV8vBVQwMR8PmcuFAplSv7V5Q4av4gvUflUzlpEaaJSOpw9baWNsnjhiJwoEYkK78

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8d8bccb8e3ba54a5168e2c18becc4bece5bca90edb430f16c79279cf89a45874
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections