General
-
Target
BoostLoader.exe
-
Size
51KB
-
Sample
240222-snk8tabe4x
-
MD5
57ea0794f42770a46a04654ba8182e94
-
SHA1
da89c0fba72bbc97070830e7c82eb5d756cd2870
-
SHA256
addc8ce8d3585541532d9cd533c3da3e8d301b53fddd37f972051e3838da7abb
-
SHA512
8143f50f8c049c9c8c038d82ab22b102ce55f2902fdd7e8f0aa82072a56348efd89c675e35b43e634611174f69f0c3b6eb4647987c9e96f56c95a7ea042fe53d
-
SSDEEP
768:rmry/329e5ew0AsnmYlB7Q/80svMIBhBshszXHj91eL6pucVB+1P09z5:d/Lew0Ak7QbvssCze5Pcz5
Static task
static1
Behavioral task
behavioral1
Sample
BoostLoader.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1209556025984811048/FntoxASlrfqyFVYWHJOR6g3gwuEED0AVfbHu2PW_kbbNMm_xDWYzkGLyUDSsvwmC1scU
Targets
-
-
Target
BoostLoader.exe
-
Size
51KB
-
MD5
57ea0794f42770a46a04654ba8182e94
-
SHA1
da89c0fba72bbc97070830e7c82eb5d756cd2870
-
SHA256
addc8ce8d3585541532d9cd533c3da3e8d301b53fddd37f972051e3838da7abb
-
SHA512
8143f50f8c049c9c8c038d82ab22b102ce55f2902fdd7e8f0aa82072a56348efd89c675e35b43e634611174f69f0c3b6eb4647987c9e96f56c95a7ea042fe53d
-
SSDEEP
768:rmry/329e5ew0AsnmYlB7Q/80svMIBhBshszXHj91eL6pucVB+1P09z5:d/Lew0Ak7QbvssCze5Pcz5
-
Detect Umbral payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-