General
-
Target
DominantExecutor.exe
-
Size
235KB
-
Sample
241027-pgwjesvncn
-
MD5
cd020f630a72c41f0cac05594e2531a8
-
SHA1
5b50eaf7e1a05898b7b83a6e7be6cb828006345a
-
SHA256
365f462f95da9ec8d143ca51af88aeb8c9037de86586650288804ae10cc99b27
-
SHA512
617876e1fd81f9e41c78cd2ea905bf6ff7b985dc123dba98a031c69172bf8ceb947a7d73495f2cecdbba6c1bb55354b72bcf1446158adcb8ddf045f456ba8174
-
SSDEEP
6144:rloZM+rIkd8g+EtXHkv/iD4uA4LbhS6F6AxDeeb9X0b8e1mMx7i:poZtL+EP8uA4LbhS6F6AxDeeb+7xW
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1299078252156948541/7550Q1tgxJx5anCYTTFh4CKPN6ooqp2koK--uLz8yz9w9dcKnvZLvK_HR2-Jc1EbaBtJ
Targets
-
-
Target
DominantExecutor.exe
-
Size
235KB
-
MD5
cd020f630a72c41f0cac05594e2531a8
-
SHA1
5b50eaf7e1a05898b7b83a6e7be6cb828006345a
-
SHA256
365f462f95da9ec8d143ca51af88aeb8c9037de86586650288804ae10cc99b27
-
SHA512
617876e1fd81f9e41c78cd2ea905bf6ff7b985dc123dba98a031c69172bf8ceb947a7d73495f2cecdbba6c1bb55354b72bcf1446158adcb8ddf045f456ba8174
-
SSDEEP
6144:rloZM+rIkd8g+EtXHkv/iD4uA4LbhS6F6AxDeeb9X0b8e1mMx7i:poZtL+EP8uA4LbhS6F6AxDeeb+7xW
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-