General

  • Target

    Bloxtrap.exe

  • Size

    231KB

  • MD5

    30e78c99e6dadf3e214426fad0aa70ad

  • SHA1

    e7c69f6df99f06632a451d633e615f274b5eaed6

  • SHA256

    e347a40fb7e3ef7705992bce042a420c6fd25913aa931e6fd78ad91b6024e0ee

  • SHA512

    7c93c81962a0930821bc972578f1cdd5b0309005d5ef63a52ea28cfd6dab8dac5364b57c5cb9360b3166a724c4c4bbf30d48f78f09b435c7c8b9c8676e8bb859

  • SSDEEP

    6144:8loZM+rIkd8g+EtXHkv/iD4o1me/1+mpusl3ySXLqb8e1mFOi:aoZtL+EP8o1me/1+mpusl3ySXK6

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1292185162154639401/i6WSPWI88KQWZx04tptSZOx9m8JrKRxH0gkCtzrGCstdSnAqaK9x7n01XecqBxUyKk8m

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Bloxtrap.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.