Overview
overview
10Static
static
10GeoLocate ...id.exe
windows7-x64
10GeoLocate ...id.exe
windows10-2004-x64
10GeoLocate ...te.exe
windows7-x64
3GeoLocate ...te.exe
windows10-2004-x64
3GeoLocate ...on.dll
windows7-x64
1GeoLocate ...on.dll
windows10-2004-x64
1GeoLocate ...rt.bat
windows7-x64
10GeoLocate ...rt.bat
windows10-2004-x64
10General
-
Target
GeoLocate (1).rar
-
Size
316KB
-
Sample
241011-1lqphszfmk
-
MD5
5f580514f24c6991b0fb893d71cd7183
-
SHA1
f2f1a6efdfae8de7be414e8438119a76fd13d891
-
SHA256
e88b3a06ac0cbf4130b1c66dde276a4062f472a71d2bf72048ffb577318d5979
-
SHA512
c5b042b1b329ccb9c5761f579c64cd410fca20ab6ae10982c72b8332dde67cc9a4ee77ab1278514eb041c2b6eec911ddf53191c9d8076c886cae3ceb21d488c0
-
SSDEEP
6144:ZLNW7iZ5uKnKQ4TuV1sU4URDAHPgNtUlqTz1vAWCEBlE2kw6L:xNW7e5Kvc14UR9UluIWCYlE2Z6L
Behavioral task
behavioral1
Sample
GeoLocate (1)/GeoLocate/Src/Files/skid.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
GeoLocate (1)/GeoLocate/Src/Files/skid.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
GeoLocate (1)/GeoLocate/Src/GeoLocate.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
GeoLocate (1)/GeoLocate/Src/GeoLocate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
GeoLocate (1)/GeoLocate/Src/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
GeoLocate (1)/GeoLocate/Src/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
GeoLocate (1)/GeoLocate/Start.bat
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1286714539492249691/WGN7-dFwgZ0rCdSawTA_6w4aqFusamrpnEHJq2mpQA-uVYCCW9OCO2W1dKDE0JeS5MPw
Targets
-
-
Target
GeoLocate (1)/GeoLocate/Src/Files/skid.exe
-
Size
230KB
-
MD5
de2d4e3d82dc91ee44c91793de896c7a
-
SHA1
3b8db665d3666be6a4234c801b9ca93ced36655e
-
SHA256
2744f1315bfa21aef381540d3ad53bc90cf15a8513905aba442b4610e8f0c337
-
SHA512
6a257e6df13bd6dcc1452fa692515b955896f1141aad84110ceaad5a3a929607586c849bcfdb161d648e89c53d747a39e564551172fd36c1e440618346b7b40f
-
SSDEEP
6144:jloZM+rIkd8g+EtXHkv/iD4Ff6Cj5nsAv7OXZkQlPJXb8e1mq/i:BoZtL+EP8t6Cj5nsAv7OXZkQllNq
-
Detect Umbral payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
GeoLocate (1)/GeoLocate/Src/GeoLocate.exe
-
Size
10KB
-
MD5
81f451dcb5fd406bcb73d4af52c10785
-
SHA1
7e66bfd724187aa1eb7fb312bc6b9bff6d675d0c
-
SHA256
1a2b8c6b26adfec263c6b903a6db7307ae98e2a4d17a7feea72ed4fdfafac76d
-
SHA512
a135c2472063cc19fca2832ce464d436fc6efcb4e9b1ad5f3fa6752e63f93d40dee8bb6ebd86016de79607c2543f563cfd7ca7b69d1941017548482982613596
-
SSDEEP
192:zqB+ypmtM8OrGq8W+drdDWmfoKXVbqU+qi:zKz1ffW9Vmq
Score3/10 -
-
-
Target
GeoLocate (1)/GeoLocate/Src/Newtonsoft.Json.dll
-
Size
695KB
-
MD5
195ffb7167db3219b217c4fd439eedd6
-
SHA1
1e76e6099570ede620b76ed47cf8d03a936d49f8
-
SHA256
e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
-
SHA512
56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
SSDEEP
12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
Score1/10 -
-
-
Target
GeoLocate (1)/GeoLocate/Start.bat
-
Size
65B
-
MD5
35fe1bc3ce269544b91a4f9d224627c6
-
SHA1
6c84b83ed36f95b805687e5c500e44faf0d144db
-
SHA256
6ed72f86689c84cc2f2680a99d47dd92a4dc9941ff483530814148a587e729c7
-
SHA512
aa72112556953f27f84e1b97de54574776a5043e924caf0935fac3db4c0c6a13db4a85467f7df0755667860b591ae50252358e72374a766a93a18ecfb3ec1403
-
Detect Umbral payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-