General
-
Target
0x0007000000015f71-121.dat
-
Size
229KB
-
Sample
241030-jlxz6azqcq
-
MD5
06129ffc46e854930cfcaa754ca1d487
-
SHA1
e7c173c48aa107ec63bd6f9030c9ec6fe889d832
-
SHA256
10d28e18a7df4b2c30e05e5e361f1724e0b6ea8c021d8105ee30354be79b98d1
-
SHA512
b7121a2a65f317edbc1b4dd8dec427c277fad2b521a211d1408bc06b79431c418dad32ed61481c5ef49511cd167846e026a86147ae77bd9b0e607918feb66ab9
-
SSDEEP
6144:tloZM+rIkd8g+EtXHkv/iD4OUCKbhS6FOAxDeebn4b8e1mSTi:voZtL+EP8OUCKbhS6FOAxDeebAo
Behavioral task
behavioral1
Sample
0x0007000000015f71-121.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1266665187293794356/BgUJDQi9QXAA0avjRcAiy-uTUWdbVUSk8SQjon--JNjDxPP5bEhE6DLfJFghJ_KLSRhA
Targets
-
-
Target
0x0007000000015f71-121.dat
-
Size
229KB
-
MD5
06129ffc46e854930cfcaa754ca1d487
-
SHA1
e7c173c48aa107ec63bd6f9030c9ec6fe889d832
-
SHA256
10d28e18a7df4b2c30e05e5e361f1724e0b6ea8c021d8105ee30354be79b98d1
-
SHA512
b7121a2a65f317edbc1b4dd8dec427c277fad2b521a211d1408bc06b79431c418dad32ed61481c5ef49511cd167846e026a86147ae77bd9b0e607918feb66ab9
-
SSDEEP
6144:tloZM+rIkd8g+EtXHkv/iD4OUCKbhS6FOAxDeebn4b8e1mSTi:voZtL+EP8OUCKbhS6FOAxDeebAo
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-