General
-
Target
release07052024.exe
-
Size
234KB
-
Sample
241028-zppqysxdpl
-
MD5
b7003ff817ee11ddb615fd88dd82fdcf
-
SHA1
43cb7c473ddcff872931ed0628cf25543cd56593
-
SHA256
2d1d0f47365bdb80e32d3378591b13b6412d2b67071d8083f95c8317cfa60fef
-
SHA512
b5ba5b1c858623a2d75316199229fc2dad581200b874ef2907d795948d79605237e7195365d81eedf3c5db9cd8c1542d638cd94ca47fb9911502e6596269ec6e
-
SSDEEP
6144:XloZM+rIkd8g+EtXHkv/iD4ZDmsN8e1mqtiU:1oZtL+EP8ZdG
Behavioral task
behavioral1
Sample
release07052024.exe
Resource
win7-20241010-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1258871243151511604/TGjaKxtf826E6AVqdGizdApxF6m1fbbUC9epKT-XAklhrTK-B6v7A5LHoChWHOPpWUBO
Targets
-
-
Target
release07052024.exe
-
Size
234KB
-
MD5
b7003ff817ee11ddb615fd88dd82fdcf
-
SHA1
43cb7c473ddcff872931ed0628cf25543cd56593
-
SHA256
2d1d0f47365bdb80e32d3378591b13b6412d2b67071d8083f95c8317cfa60fef
-
SHA512
b5ba5b1c858623a2d75316199229fc2dad581200b874ef2907d795948d79605237e7195365d81eedf3c5db9cd8c1542d638cd94ca47fb9911502e6596269ec6e
-
SSDEEP
6144:XloZM+rIkd8g+EtXHkv/iD4ZDmsN8e1mqtiU:1oZtL+EP8ZdG
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-