General
-
Target
e0310128f52613f4c4d92709888560dcfc9fd5d6501e1bd75b1c5ed3646cf8c0.exe
-
Size
266KB
-
Sample
250212-vzexaa1mbw
-
MD5
1207c1981b07615b9c02fb400030fa04
-
SHA1
02abf488720b4bd450fedc5a34ed59f66d8e73e8
-
SHA256
e0310128f52613f4c4d92709888560dcfc9fd5d6501e1bd75b1c5ed3646cf8c0
-
SHA512
4051b8d7f9c36e03141afb3c573fb3525a33238fd6ddb8085c78e31fe89b6f0ffbb77e54c5d21bc404bb1f69e3cf8280eb6d42196d84ee80e4dfd07b8eca3b0b
-
SSDEEP
6144:HloZMLrIkd8g+EtXHkv/iD4LEXrfPlO2Zic1niinT4Xb8e1mfi/eYk:FoZ0L+EP8LQrfPlO2Zic1niinTqh/Zk
Behavioral task
behavioral1
Sample
e0310128f52613f4c4d92709888560dcfc9fd5d6501e1bd75b1c5ed3646cf8c0.exe
Resource
win7-20241010-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1334918270951751742/ykbIeRIpFV4Px7Tfz8ZJbhs4zhUhLmHPwyt3wHsYxrJVNpFb643KDrwkegj27iGah8Yg
Targets
-
-
Target
e0310128f52613f4c4d92709888560dcfc9fd5d6501e1bd75b1c5ed3646cf8c0.exe
-
Size
266KB
-
MD5
1207c1981b07615b9c02fb400030fa04
-
SHA1
02abf488720b4bd450fedc5a34ed59f66d8e73e8
-
SHA256
e0310128f52613f4c4d92709888560dcfc9fd5d6501e1bd75b1c5ed3646cf8c0
-
SHA512
4051b8d7f9c36e03141afb3c573fb3525a33238fd6ddb8085c78e31fe89b6f0ffbb77e54c5d21bc404bb1f69e3cf8280eb6d42196d84ee80e4dfd07b8eca3b0b
-
SSDEEP
6144:HloZMLrIkd8g+EtXHkv/iD4LEXrfPlO2Zic1niinT4Xb8e1mfi/eYk:FoZ0L+EP8LQrfPlO2Zic1niinTqh/Zk
-
Detect Umbral payload
-
Umbral family
-
Downloads MZ/PE file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-