Behavioral task
behavioral1
Sample
osintbeta.exe
Resource
win7-20240903-en
General
-
Target
osintbeta.exe
-
Size
631KB
-
MD5
651f9b8d2e6d57a5ad192c4f9e6bc5fe
-
SHA1
351d05c661abc76b335cb99b620a8a81367e41de
-
SHA256
10a0c83bc6522b597850d3871616715533031cba948807d3831b5a239d5d7f9b
-
SHA512
9573a78740c3ada200d282c34ffb07bc4f5549a7ddd5dcdf5f0070aba5be5cc0bdc0ab1bc54bd0283a43bc34febc5e0c7fb1ade6bb5173e598890be76445256b
-
SSDEEP
12288:hoZtL+EP8l1xMw2xpamPyAxVkghNiMdRC:fI8rxMw2xpamPyAxVkgriMdA
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1312288623672037376/2GH04B8YXsC6XReHUK0ahKf5rxv-juGkGHKoDn44G9e1LgY6b0deNb9KwidwVkVbfmse
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource osintbeta.exe
Files
-
osintbeta.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 403KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ