General
-
Target
Universal Hu6 and Aurium V4 [V11].exe
-
Size
333KB
-
MD5
210d0781bb57f3a554c96bb467d6cd57
-
SHA1
3be6edb49c63f7d9ee5f481c4d75f7f1d6ae2258
-
SHA256
1fbf34bae8537e2ef6f1bf09ae1c0f7b3a802cf76a3114c4e80a7be28d1e2039
-
SHA512
3c54403550f8885708d83bf5d23540946c33cd69ab6c990dd21f3b63803636fa202fbf2895cad830f6542ee90aa130ed3de07c117599c132295999882d955f72
-
SSDEEP
6144:2loZMLrIkd8g+EtXHkv/iD4SL72ywvrYahkijD6I8nb8e1mlHaigvRYIcLbFNf45:AoZ0L+EP8SL72ywvrYahkijD6IaCf
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1280600499225104489/avTANN0ygl5E8mOKrpbAeCDqd1W0Hhauprkwd68SFSZ2Q9oC7b0dMrMrGrNlSXY-1gIo
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Universal Hu6 and Aurium V4 [V11].exe
Files
-
Universal Hu6 and Aurium V4 [V11].exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ