General

  • Target

    Loader.exe

  • Size

    230KB

  • MD5

    01ef484bd08794522afb7af0f4a39159

  • SHA1

    7e9edc911734c592881899a5271bfa83e112ab12

  • SHA256

    2e1ddba1f76d93d7354190865523d53ff0b1f14876da06cc61f1bde9b6b686a4

  • SHA512

    e6ab72865d8a7dd29e1d04029a9be5f46a199614a8b67cdae27e2e31cb2a96827b8b39a73c103d2bc67713909b0d32e6b9f02d6dd714bd889b544eff0585627b

  • SSDEEP

    6144:jloZM+rIkd8g+EtXHkv/iD4z1MKYe5xyuXKYZd8O+gbb8e1msi:BoZtL+EP8z1MKYe5xyuXKYZd8Ci

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1324149676450123820/Ch478qL19IuuscU5ZnjMw3QZNcaeE-OInimQf1TXgW5cTcg_87xf6oUZDJV_I0Uk6sWI

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Loader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections