Behavioral task
behavioral1
Sample
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN.exe
Resource
win7-20241010-en
General
-
Target
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN
-
Size
257KB
-
MD5
48eccdf62898683d91626bc9ec21c8b0
-
SHA1
05b3f36379d25e8ab6748c57237e950b8ce06b21
-
SHA256
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0a
-
SHA512
ad824674cfabc773d8d50088bc0b01016a6238765079a6e41752b5440c8024aedba0a45242de5969b28b27831a618bc17010f7001cb02e1786461a4b46344285
-
SSDEEP
6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7s:doZtL+EP8u76SecjfUx1gevPeIqRWjK
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1324414504867467325/ugxr6pCjYDiPPx0dsiHqnLtebwW1baMrpC9h00piLXw8JXyaxiOvmIHCVIVxKMMhKSWQ
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN
Files
-
2c9afcd5c6d57f9fcba5da94bdcc1d7690d47bc1b1fcf9a164b20de11e736d0aN.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ