General

  • Target

    Swift.exe

  • Size

    231KB

  • MD5

    6e2fe62ba106a5e869fabb48565305ed

  • SHA1

    56a781fe3ed0182ae22c6c10690d2ae4e870be6e

  • SHA256

    b0994dcb3d7268ace7b5fd363bf09683e2ba2d900149151602c277f36548c1a5

  • SHA512

    48759991bed49f9366f088b15a3794c45189951b73aba3b977b16070d51067b2216c3740654c387fcc28bef159393c0d01923c84d1f029b8412957652fb9867e

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4j0iWVjgULryD1Ac5hJ5b8e1mDvi:joZtL+EP8j0iWVjgULryD1Ac5vRR

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1325147610498990184/_S5t34piVZ9w4jNK0Uk7vmAagN7mrlofpStBmLWZihZU4CFArBMOQ3stCZ2bi-ynKaHD

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Swift.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections