General
-
Target
secondslut.exe
-
Size
229KB
-
Sample
240927-p8pvystcrp
-
MD5
1d2a9064181fffe2ae21bb90c9691d2b
-
SHA1
eb03952450e8f309fb04058759e142740eb08069
-
SHA256
3d37df482191306f97b6a590305624e1316082e2b655812f4cda62641afd20e1
-
SHA512
fd25b17d558304b816fdc76bdc979f0e054dd7090ee3051044ce3fa0ed4e1e1d059f447b412b0827d6897a43e21bda5d6e476b7ee2f78d8f3d233e9f04c82328
-
SSDEEP
6144:FloZM3fsXtioRkts/cnnK6cMl97ERPlO2Zjc1niinbVb8e1moi:HoZ1tlRk83Ml97ERPlO2Zjc1niinZ2
Behavioral task
behavioral1
Sample
secondslut.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1289196962704265226/4SROW5curUe6n7EGqeWKq0HqFRBeB_OQKYzM0t6rypXLyCDNVVp4kP9wEcDGDnfwyigA
Targets
-
-
Target
secondslut.exe
-
Size
229KB
-
MD5
1d2a9064181fffe2ae21bb90c9691d2b
-
SHA1
eb03952450e8f309fb04058759e142740eb08069
-
SHA256
3d37df482191306f97b6a590305624e1316082e2b655812f4cda62641afd20e1
-
SHA512
fd25b17d558304b816fdc76bdc979f0e054dd7090ee3051044ce3fa0ed4e1e1d059f447b412b0827d6897a43e21bda5d6e476b7ee2f78d8f3d233e9f04c82328
-
SSDEEP
6144:FloZM3fsXtioRkts/cnnK6cMl97ERPlO2Zjc1niinbVb8e1moi:HoZ1tlRk83Ml97ERPlO2Zjc1niinZ2
-
Detect Umbral payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-