General

  • Target

    yukariPRO.exe

  • Size

    231KB

  • MD5

    83617498ad1496a62a531bcc1e3719a0

  • SHA1

    80d5f3363370f67086342b43a780362e09171bb8

  • SHA256

    02c1514216aac754514600a3958d3b52311ea8e4dfd3eff1768ee382db1d611c

  • SHA512

    5598953ab899443708e1c4c7c7fd762e43c69d2e40a8af64f48606fda6e275354c6b13ac9d467c1210dd2d9b55bd01dcfe2ab89188e225a38e2b125a543a557e

  • SSDEEP

    6144:GloZMDkOQVGHstJZWdhQETaUNTJq8DjghVkiPviCrj8e1mUJxjDS:woZXUHsHuLNTJq8DjghVkiPviCnPJxj+

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1329937672709345321/Jk3tShKfPuhT6PHIc_ohSYHsDFNPEuycYnvEnFJp6d106ycgjUyJxWSCWzE_nXJjpP6H

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • yukariPRO.exe
    .exe windows:4 windows x86 arch:x86

    Password: 1

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections