General
-
Target
Galaxy Swapper V3.exe
-
Size
229KB
-
Sample
240925-vjc3rawgjj
-
MD5
a42b110fb9cfb30ec45c6062dcfbb754
-
SHA1
4376c74bff24fd74c10ec920f13a48c87ed2b961
-
SHA256
c447ffa201b6c129eaeb205610b9fe4cdde08f703f4bbbaccf65eab904626ee8
-
SHA512
d1da7af81942a0732d45cfb1c0b758c20b5cefcf9780c5d80335259fe5333309b9cc9019b87e048e11c8e152e4250ae45eb6d86404bdbbf27ad38d6eaf33c62d
-
SSDEEP
6144:FloZMLrIkd8g+EtXHkv/iD4OtBlKInDAUZMK7bC3Bb8e1mfi:HoZ0L+EP8OtBlKInDAUZMK7bCJl
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1287234221945000051/klsI9ScjwmWRugMc-XHoSBV9vEyU6Ygnjd04SIlzZk9pL8aq43wqxBQxGHa6FYf6D9cy
Targets
-
-
Target
Galaxy Swapper V3.exe
-
Size
229KB
-
MD5
a42b110fb9cfb30ec45c6062dcfbb754
-
SHA1
4376c74bff24fd74c10ec920f13a48c87ed2b961
-
SHA256
c447ffa201b6c129eaeb205610b9fe4cdde08f703f4bbbaccf65eab904626ee8
-
SHA512
d1da7af81942a0732d45cfb1c0b758c20b5cefcf9780c5d80335259fe5333309b9cc9019b87e048e11c8e152e4250ae45eb6d86404bdbbf27ad38d6eaf33c62d
-
SSDEEP
6144:FloZMLrIkd8g+EtXHkv/iD4OtBlKInDAUZMK7bC3Bb8e1mfi:HoZ0L+EP8OtBlKInDAUZMK7bCJl
-
Detect Umbral payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-