General
-
Target
26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73aN.exe
-
Size
266KB
-
Sample
250208-sblc2s1mes
-
MD5
06ed69fb8603816d21c0a44d500ed3f0
-
SHA1
646c21d11c839557646068074fb913644104fc1a
-
SHA256
26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73a
-
SHA512
4979eb18a80869aefb0f6ac9717f17a4f36bc8eaeb8a79552ca7d083ba7b99034f5abd00004580af163cfa4f4b1773651ade929b5e78cc6a8ce8b6ca56570fa2
-
SSDEEP
6144:HloZMLrIkd8g+EtXHkv/iD4LEXrfPlO2Zic1niinT4Xb8e1mfi/eY:FoZ0L+EP8LQrfPlO2Zic1niinTqh/Z
Behavioral task
behavioral1
Sample
26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73aN.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1334918270951751742/ykbIeRIpFV4Px7Tfz8ZJbhs4zhUhLmHPwyt3wHsYxrJVNpFb643KDrwkegj27iGah8Yg
Targets
-
-
Target
26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73aN.exe
-
Size
266KB
-
MD5
06ed69fb8603816d21c0a44d500ed3f0
-
SHA1
646c21d11c839557646068074fb913644104fc1a
-
SHA256
26e969ff139eddbef22c25339559ca9d0a9fa57c33ba1ce694555d808e98e73a
-
SHA512
4979eb18a80869aefb0f6ac9717f17a4f36bc8eaeb8a79552ca7d083ba7b99034f5abd00004580af163cfa4f4b1773651ade929b5e78cc6a8ce8b6ca56570fa2
-
SSDEEP
6144:HloZMLrIkd8g+EtXHkv/iD4LEXrfPlO2Zic1niinT4Xb8e1mfi/eY:FoZ0L+EP8LQrfPlO2Zic1niinTqh/Z
-
Detect Umbral payload
-
Umbral family
-
Downloads MZ/PE file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-