General
-
Target
DominantExecutor (1).exe
-
Size
231KB
-
Sample
241027-phwwksybpl
-
MD5
16171d12f35e11115cedc4284f86958b
-
SHA1
e17c29c6b4b3f54f6d6cedf556f5b110b1965479
-
SHA256
a78dcf241ef32561d3ae030149169f37085ba754e7f148a21e8f22951b028a73
-
SHA512
975f5e6a099536f9f13720f85a41b519d730ef814409c6d45614bbaba6a5b06e0ee996d7a8dbf1c5b066b59bae2836ecf7a22bc303df7f0cb21f1c06e527735d
-
SSDEEP
6144:8loZM+rIkd8g+EtXHkv/iD40kijGELnsvd42X3WYx8b8e1muSi:aoZtL+EP80kijGELnsvd42X3WYitH
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1299370629824512111/FuPScG6DLCG9POPbj8bk8oTq5VoKOVqfisCJ07VmDVQfyM30RsO4HoLfncfkOe23qFov
Targets
-
-
Target
DominantExecutor (1).exe
-
Size
231KB
-
MD5
16171d12f35e11115cedc4284f86958b
-
SHA1
e17c29c6b4b3f54f6d6cedf556f5b110b1965479
-
SHA256
a78dcf241ef32561d3ae030149169f37085ba754e7f148a21e8f22951b028a73
-
SHA512
975f5e6a099536f9f13720f85a41b519d730ef814409c6d45614bbaba6a5b06e0ee996d7a8dbf1c5b066b59bae2836ecf7a22bc303df7f0cb21f1c06e527735d
-
SSDEEP
6144:8loZM+rIkd8g+EtXHkv/iD40kijGELnsvd42X3WYx8b8e1muSi:aoZtL+EP80kijGELnsvd42X3WYitH
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-