General
-
Target
NEW_JJSploit.zip
-
Size
4.9MB
-
Sample
250112-f7xpqs1jgm
-
MD5
5931eed0dcd54b44fead39ef0979eed2
-
SHA1
1e91995d967e65ad7e65b2565c7d9b0b395e16d5
-
SHA256
417635e7890c0ff3c569ccb3800a31a44b141e0754f0266cf48d44bb87959c4f
-
SHA512
9d1ac9d42a7eba2403e6e9b8ad40124e2a60a9f60af863eadf3254af12e8decaba0cd0080a3ec9d0360171d99b778a70784268423bc618f508eb4c06a3df162c
-
SSDEEP
98304:LesIvGlw5VQg5fTaXfE9qKwJioYYB400Bt4xO86T82xmWv:LjI+lw5PeXM9n6t0BaOh82xms
Static task
static1
Malware Config
Targets
-
-
Target
NEW_JJSploit.zip
-
Size
4.9MB
-
MD5
5931eed0dcd54b44fead39ef0979eed2
-
SHA1
1e91995d967e65ad7e65b2565c7d9b0b395e16d5
-
SHA256
417635e7890c0ff3c569ccb3800a31a44b141e0754f0266cf48d44bb87959c4f
-
SHA512
9d1ac9d42a7eba2403e6e9b8ad40124e2a60a9f60af863eadf3254af12e8decaba0cd0080a3ec9d0360171d99b778a70784268423bc618f508eb4c06a3df162c
-
SSDEEP
98304:LesIvGlw5VQg5fTaXfE9qKwJioYYB400Bt4xO86T82xmWv:LjI+lw5PeXM9n6t0BaOh82xms
-
Detect Umbral payload
-
Umbral family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-