General
-
Target
1856f48b7896bca66780a4f7acdce1a4598b6a112f21cba787c9ec6da8d69ec3N
-
Size
227KB
-
Sample
241106-l5wybayepm
-
MD5
b7142439fd3f0f3770ebf0021a8b9d40
-
SHA1
2f258bfaca9191ec7cc266064da36e41fe839449
-
SHA256
1856f48b7896bca66780a4f7acdce1a4598b6a112f21cba787c9ec6da8d69ec3
-
SHA512
861d54ed93f3adb65ed9d2d0759f5e144841572b648a3129b90621cfda5c836264527979407ec0d4d2e9c511ef8445361fc53a8c4cea44f725e74caccd744eed
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4t+Yxhv0IHd2PxM4d0ib8e1mxYi:ooZtL+EP8t+Yxhv0IHd2PxM4dDwh
Behavioral task
behavioral1
Sample
1856f48b7896bca66780a4f7acdce1a4598b6a112f21cba787c9ec6da8d69ec3N.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1271171461423562873/UcwkdS8pW8NPWN8bqEKxj1C2jviOZJjyf6WY_8iCbVGcVQS_don1IMdDKBJ56R7Jk7Tp
Targets
-
-
Target
1856f48b7896bca66780a4f7acdce1a4598b6a112f21cba787c9ec6da8d69ec3N
-
Size
227KB
-
MD5
b7142439fd3f0f3770ebf0021a8b9d40
-
SHA1
2f258bfaca9191ec7cc266064da36e41fe839449
-
SHA256
1856f48b7896bca66780a4f7acdce1a4598b6a112f21cba787c9ec6da8d69ec3
-
SHA512
861d54ed93f3adb65ed9d2d0759f5e144841572b648a3129b90621cfda5c836264527979407ec0d4d2e9c511ef8445361fc53a8c4cea44f725e74caccd744eed
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4t+Yxhv0IHd2PxM4d0ib8e1mxYi:ooZtL+EP8t+Yxhv0IHd2PxM4dDwh
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-