General
-
Target
v9ju88.exe
-
Size
229KB
-
Sample
241010-gw6c6svepn
-
MD5
9252505656ab18c34d4ecff6a7f86263
-
SHA1
dfa01cbe5c99fbf67a5063f99c67669382e43356
-
SHA256
78da8433390c0aaf2e5f748ff266bacad23fe9d05b1834eabceeb6ad69859589
-
SHA512
5e270de9982c3137c16e32fa4c88f9a414893c623fbcdd5cb2f3ff9bbf82eac82bb8d01100d60ea8633da875b36df39d657a9090e393d4fdf717575821bce8a5
-
SSDEEP
6144:lloZMcrIkd8g+EtXHkv/iD4l6qZEKtFu9r20VJgU8b8e1mbDi:noZrL+EP8l6qZEKtFu9r20VJgZd
Behavioral task
behavioral1
Sample
v9ju88.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1289681227711905882/4ls8QquqVGowr_EXsWQHgHYoYI53Bn36p04PP2sNUo6M6rTng5alXP6ABgXbGM7xSIBW
Targets
-
-
Target
v9ju88.exe
-
Size
229KB
-
MD5
9252505656ab18c34d4ecff6a7f86263
-
SHA1
dfa01cbe5c99fbf67a5063f99c67669382e43356
-
SHA256
78da8433390c0aaf2e5f748ff266bacad23fe9d05b1834eabceeb6ad69859589
-
SHA512
5e270de9982c3137c16e32fa4c88f9a414893c623fbcdd5cb2f3ff9bbf82eac82bb8d01100d60ea8633da875b36df39d657a9090e393d4fdf717575821bce8a5
-
SSDEEP
6144:lloZMcrIkd8g+EtXHkv/iD4l6qZEKtFu9r20VJgU8b8e1mbDi:noZrL+EP8l6qZEKtFu9r20VJgZd
-
Detect Umbral payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-