General
-
Target
mapleC2.exe
-
Size
229KB
-
Sample
250126-cn4gdszmcr
-
MD5
8fdc5324c6283723749bec8199a6078e
-
SHA1
d9480e0b5d4dffbc82f542c66d3f0efc0f18c95c
-
SHA256
10fc7787e75df4375d177ade5d874691e815204bba4034b54a2b053ad26a1f0d
-
SHA512
f375bec52dfd7f6f86db525a734c9331152975ad43633b77fc2fb0df31c4e3e408410ab14262fc9f6af650f8ae6c1fa15583c7828cdf0b1ade1c9be6548ae3f4
-
SSDEEP
6144:tloZM0rIkd8g+EtXHkv/iD4JRBJoOJBidHaIJtMVtb8e1mj5i:voZDL+EP8JRBJoOJBidHaIJtMfkg
Behavioral task
behavioral1
Sample
mapleC2.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1330716271255228609/IJ5fctnpAI0-OKdKe8_9HLUXRtWL-GkV2v5ywlG5lY-o4zpL4fVuVLWaxhsjb0VEPBe3
Targets
-
-
Target
mapleC2.exe
-
Size
229KB
-
MD5
8fdc5324c6283723749bec8199a6078e
-
SHA1
d9480e0b5d4dffbc82f542c66d3f0efc0f18c95c
-
SHA256
10fc7787e75df4375d177ade5d874691e815204bba4034b54a2b053ad26a1f0d
-
SHA512
f375bec52dfd7f6f86db525a734c9331152975ad43633b77fc2fb0df31c4e3e408410ab14262fc9f6af650f8ae6c1fa15583c7828cdf0b1ade1c9be6548ae3f4
-
SSDEEP
6144:tloZM0rIkd8g+EtXHkv/iD4JRBJoOJBidHaIJtMVtb8e1mj5i:voZDL+EP8JRBJoOJBidHaIJtMfkg
-
Detect Umbral payload
-
Umbral family
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-