General

  • Target

    Woofer.exe

  • Size

    229KB

  • MD5

    8a2615083862de25f6d86c69304a4078

  • SHA1

    4c88dbba86b4023a22700671e2116c96bd8ebb0f

  • SHA256

    8cbfb916aafe951957c1c79531deaa85f3c3d71bd9afa0b42d0996c71371116f

  • SHA512

    ae108ba79a2f5782aa82f90fda878ccc442f15c0938011b5d03bafb0f4c72497813b21f8bf7c4f358f232bf118946e556d2315cf52cdc91c6dd992d7bd326df4

  • SSDEEP

    6144:lloZMArIkd8g+EtXHkv/iD45GEoaxfEY32mfh8ItRub8e1mfi:noZHL+EP85GEoaxfEY32mfh8It8V

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1338987638002024459/kMMxI68f8f2NXZJyfhthmhw7iaH0e0cRTEYjgULB9xl-r_958kqvH314t4TpyA7dKW12

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Woofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections