General
-
Target
2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fedN
-
Size
7KB
-
Sample
240929-2nwtzstfkl
-
MD5
a55a5ee391fa38f5f2b7a8c13da0d7e0
-
SHA1
09411fe1464fb2e6586736c3292cb06e60e482aa
-
SHA256
2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fed
-
SHA512
f82eba269c0e5fa276fd46e110ed7d76f15b53dcc410c4c7bb329393cd0a3b7d40bb41827cd1075778b0075f0fcb366b7e5b62a69e2c3bc3dc3c50ee2252b242
-
SSDEEP
96:uy13k1c0tjvPhLJLMTItVVlkNHRt+sCiEVUY/e2PK0/vzKzNt:J3k1c0tLPh9LNrv83+sSVUYH/vzs
Static task
static1
Behavioral task
behavioral1
Sample
2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fedN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fedN
-
Size
7KB
-
MD5
a55a5ee391fa38f5f2b7a8c13da0d7e0
-
SHA1
09411fe1464fb2e6586736c3292cb06e60e482aa
-
SHA256
2442b06828c640b3219de3def5337deccd9df4333d583096e6744f03ecc26fed
-
SHA512
f82eba269c0e5fa276fd46e110ed7d76f15b53dcc410c4c7bb329393cd0a3b7d40bb41827cd1075778b0075f0fcb366b7e5b62a69e2c3bc3dc3c50ee2252b242
-
SSDEEP
96:uy13k1c0tjvPhLJLMTItVVlkNHRt+sCiEVUY/e2PK0/vzKzNt:J3k1c0tLPh9LNrv83+sSVUYH/vzs
-
Detect Umbral payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-