General

  • Target

    Loader.exe

  • Size

    496KB

  • MD5

    5679fd7303147ee1bc6c4adc979de286

  • SHA1

    65354bef2646e0d6536ed4ca614839c4e245ad16

  • SHA256

    cbf4e042e45bf47e1070d666b8078444303b423ecb62fe98ee9a11c905b4fd16

  • SHA512

    6d0f2241a55c1549cc9e02fdd7f0368548a3c933772ffb5a8a3bf47a9743470fe017f4bf6e5dad0f4b87111416418db67b6cb4a887378ee3ef88554e0f80c221

  • SSDEEP

    12288:ZoZ1tlRk83Mlp6BpcCFdWXp8aLLy5MvOAs:q5r3bBpcCFdWXp8aLLy5yq

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discordapp.com/api/webhooks/1299393161311027211/nrm0Am6pa5NSYbd2OqLmH7aFF8MqPekvxp2H_g1oUHIAhFVn25ciuIz9WjipPG-HMhFc

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Loader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections