General
-
Target
Nursultan.rar
-
Size
107KB
-
Sample
241108-pzecvs1qgz
-
MD5
8595d1278d17ddd0975956ff13964abe
-
SHA1
0ff59987a6053395248236ed0db5f581c765421e
-
SHA256
4ad4d37a29ba252afce7fc4d0fd2f034ed1ec34b07e835189f0deeac96427c03
-
SHA512
67ead5076c616b1b555da364b1984085f27944297f323ea615fe346f052bb6f5c7a5ab98925d3a2dda087d86242962a484030a153b15544fcd3fe7d5045678a2
-
SSDEEP
3072:grbF5vtTi7uzI/HUY0uoKA1odo670CcuojlA:ibF5vdouzI/yQrdL0CcuUG
Behavioral task
behavioral1
Sample
Nursultan/NursultanCrack.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1303346382320566364/NKw3SHRn53oFiPfzBhnGkM5DJDPNYfTopbE2xqInlxxGUx2Xeo3MNSDPrwfoElJVpQzF
Targets
-
-
Target
Nursultan/NursultanCrack.exe
-
Size
328KB
-
MD5
4f7415acf4f5a898dd0ea6e7924137e2
-
SHA1
13f5917af6bbf1f1f98633ac18532d8a43c2d92e
-
SHA256
c182f999bccd715dd8dfd60b2c212ceaec08bad843ee95ecef3abf6230b7a447
-
SHA512
eb903b09428f8ef8ba349a507a73627875096a4952ed768c640752b6bf1019a0ea1ca88246928055ba8591666de4dbfbf58bab65fc12e7544d013e13e838feb9
-
SSDEEP
6144:iloZM+rIkd8g+EtXHkv/iD4CzaYSx6PTg8e1mHisxBt25:soZtL+EP8CzaYSj9sxBt
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-