General
-
Target
9fa71bd01a54e0726de72e272bcbe6eb.bin
-
Size
1.1MB
-
Sample
241215-by1b2sskar
-
MD5
c43bede4625721bf7cc3ccda79e8d20e
-
SHA1
33389c3ca664e67de91bf05fb593870bb2ad1bf0
-
SHA256
fa555466f14c6d14d460a00c87489b5f4f2b0bb4670ca58d6a6d943192c556e9
-
SHA512
06b8bad9d5005885a1588782d77622cfa14f4afe03cd163254ca23f6b0a3ae81ad83342a689f6ad6d77bfcba6337c93ad487b140f1a088da5cdfeb6bd6ccd9f7
-
SSDEEP
24576:HKGsSB5V/tLAcKMzBKOfADAaepZ9seUp2r3vYfTvPV8p:HKxSl/t+Mz8OfADAaeDes7vYLvQ
Static task
static1
Behavioral task
behavioral1
Sample
666d91620d589b16b55f847c0c84396419461844d9ab844ad39a7df9d88c34e5.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
666d91620d589b16b55f847c0c84396419461844d9ab844ad39a7df9d88c34e5.exe
-
Size
1.3MB
-
MD5
9fa71bd01a54e0726de72e272bcbe6eb
-
SHA1
03822545415f9dc69207495898c706c0d8340807
-
SHA256
666d91620d589b16b55f847c0c84396419461844d9ab844ad39a7df9d88c34e5
-
SHA512
32eaa6c191f077de67251af4057ee9fee6d9ea69d58ce6d6a1c6f5623ba26013152ae614d1465939f44ad9e2125caed786fa4abc821082845037a9ab1d2a27af
-
SSDEEP
24576:x0kpqP4E3+rAOymAfu86lJ5qKYv8aIlbRnxYUsNV/qXOlY/nZZMR:kwKcATbG8TKrOlNxqXTvMR
-
Detect Umbral payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Umbral family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-