General
-
Target
solara update.bat
-
Size
696B
-
Sample
250324-k1wlbavygv
-
MD5
e53d059e74af5964cd9fcc1990fe20ed
-
SHA1
b8b2f31a75e0b01e9b8a0b20865d1a620a67953d
-
SHA256
6b38b27adbd76a7615d4f847603272918892835aef5339db8536940aab31532b
-
SHA512
c327f797b0eabbc152b5f0431fad1b89c150e65a5f047ba9e3e01ac759aaeab1c9a759cab159d42429bae656eda6c8ef95d466c39d3f982ec0549f12f02aead3
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1353647650406273086/8GnnMeDUTZK-6-j9EDZvfKzIJyfKeVtDQ5So4SbcZVbnlHXY3xScnbsdQlsZvj11NCJ3
Targets
-
-
Target
solara update.bat
-
Size
696B
-
MD5
e53d059e74af5964cd9fcc1990fe20ed
-
SHA1
b8b2f31a75e0b01e9b8a0b20865d1a620a67953d
-
SHA256
6b38b27adbd76a7615d4f847603272918892835aef5339db8536940aab31532b
-
SHA512
c327f797b0eabbc152b5f0431fad1b89c150e65a5f047ba9e3e01ac759aaeab1c9a759cab159d42429bae656eda6c8ef95d466c39d3f982ec0549f12f02aead3
-
Detect Umbral payload
-
Umbral family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-