General
-
Target
0eec8833aa50f5222085d4febcf70d570fc9cdf769fde33661c3c5f274533313
-
Size
229KB
-
Sample
250222-yfdfwswmc1
-
MD5
28dd22fab069769c895b3c902035b2a6
-
SHA1
90577e0d058c8cc553f11a56f0f6202bd614e471
-
SHA256
0eec8833aa50f5222085d4febcf70d570fc9cdf769fde33661c3c5f274533313
-
SHA512
a15a3979f708a5363851e66b199f787991fd512b58d314b9d601cb11e0bb8bc5a140b5835971dbc12f288137adf30f7e74c500064e785981b2d20c2d2e4bc74c
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4/LI6BPUonKWvRsY9O3b8e1moAi:noZtL+EP8/LI6BPUonKWvRsY9M5Z
Behavioral task
behavioral1
Sample
0eec8833aa50f5222085d4febcf70d570fc9cdf769fde33661c3c5f274533313.exe
Resource
win7-20241023-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1340764748391645225/uULT2sea9sIpCjgKKmBDah2Uj1_awysvvvG_UhFArY5rDSSew6dNx6W97h1CwsgLRWO1
Targets
-
-
Target
0eec8833aa50f5222085d4febcf70d570fc9cdf769fde33661c3c5f274533313
-
Size
229KB
-
MD5
28dd22fab069769c895b3c902035b2a6
-
SHA1
90577e0d058c8cc553f11a56f0f6202bd614e471
-
SHA256
0eec8833aa50f5222085d4febcf70d570fc9cdf769fde33661c3c5f274533313
-
SHA512
a15a3979f708a5363851e66b199f787991fd512b58d314b9d601cb11e0bb8bc5a140b5835971dbc12f288137adf30f7e74c500064e785981b2d20c2d2e4bc74c
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4/LI6BPUonKWvRsY9O3b8e1moAi:noZtL+EP8/LI6BPUonKWvRsY9M5Z
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-