General
-
Target
BoostLoader_v1.exe
-
Size
28KB
-
Sample
240224-bqgvqsdf89
-
MD5
4a68de0bacf7b13aaf73b50bfa30eefb
-
SHA1
448f7c54c470c1b88922a062984ebef021f86020
-
SHA256
63398bcbca8131165c25afdf5f04f3cebc5229828efa55d78f0bae7cc82a10f6
-
SHA512
a28d5a34fd486d205b77cdfec2c857a31510efd2535dfe228c7c8a2c9c797ee8fa531930963f18f6c4bb517a64f66728657461e952b17c8fe40796f252a6877e
-
SSDEEP
384:IbdmmHyX0F1bgqrSq6iKSLhgbcVNz3yy7dkw0yf1oIupWjW9Jf:GdfHyX0FlJOahiqdkwjtoI
Static task
static1
Behavioral task
behavioral1
Sample
BoostLoader_v1.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1210364331280040016/I1v11HzJ9503bqFhrXwnrML5qOk6sLEdbeU9uI-X_HnYuF3ipDXRAghmdJFNV9ySoE--
Targets
-
-
Target
BoostLoader_v1.exe
-
Size
28KB
-
MD5
4a68de0bacf7b13aaf73b50bfa30eefb
-
SHA1
448f7c54c470c1b88922a062984ebef021f86020
-
SHA256
63398bcbca8131165c25afdf5f04f3cebc5229828efa55d78f0bae7cc82a10f6
-
SHA512
a28d5a34fd486d205b77cdfec2c857a31510efd2535dfe228c7c8a2c9c797ee8fa531930963f18f6c4bb517a64f66728657461e952b17c8fe40796f252a6877e
-
SSDEEP
384:IbdmmHyX0F1bgqrSq6iKSLhgbcVNz3yy7dkw0yf1oIupWjW9Jf:GdfHyX0FlJOahiqdkwjtoI
-
Detect Umbral payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1