General
-
Target
wow22.exe
-
Size
227KB
-
Sample
250219-arbvfavkv7
-
MD5
b3ef176d54158b25baa27e2c091f1f0e
-
SHA1
dc425834e0f35d66bce485ead25a00be5644ff5c
-
SHA256
82bc9d17630c105e0eaa115acbb28fdd6264cf4e5da15329311817d38b9bbb09
-
SHA512
23f0bf14e5154a4c7a92905aea1fc5eb29d9a9aad76644f7bcba8fefdcf7936dec7cbf0bb63127a407313534b64689c7ffaba8585e7e8ede4a246633c5b1fa98
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4o/3V6YXzQgp8aLLy8Db8e1mVi:ooZtL+EP8o/3V6YXzQgp8aLLyij
Behavioral task
behavioral1
Sample
wow22.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1339482931164610584/rTlwFucmzC_c-XCkjdFAt9gtr9KcHUvDHD0k8wLmSAYoV9HBdiM7K_iS0sEh5I54WyeU
Targets
-
-
Target
wow22.exe
-
Size
227KB
-
MD5
b3ef176d54158b25baa27e2c091f1f0e
-
SHA1
dc425834e0f35d66bce485ead25a00be5644ff5c
-
SHA256
82bc9d17630c105e0eaa115acbb28fdd6264cf4e5da15329311817d38b9bbb09
-
SHA512
23f0bf14e5154a4c7a92905aea1fc5eb29d9a9aad76644f7bcba8fefdcf7936dec7cbf0bb63127a407313534b64689c7ffaba8585e7e8ede4a246633c5b1fa98
-
SSDEEP
6144:+loZM+rIkd8g+EtXHkv/iD4o/3V6YXzQgp8aLLy8Db8e1mVi:ooZtL+EP8o/3V6YXzQgp8aLLyij
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-