General

  • Target

    BoostLoader_v1.exe

  • Size

    28KB

  • Sample

    240224-bqgvqsdf89

  • MD5

    4a68de0bacf7b13aaf73b50bfa30eefb

  • SHA1

    448f7c54c470c1b88922a062984ebef021f86020

  • SHA256

    63398bcbca8131165c25afdf5f04f3cebc5229828efa55d78f0bae7cc82a10f6

  • SHA512

    a28d5a34fd486d205b77cdfec2c857a31510efd2535dfe228c7c8a2c9c797ee8fa531930963f18f6c4bb517a64f66728657461e952b17c8fe40796f252a6877e

  • SSDEEP

    384:IbdmmHyX0F1bgqrSq6iKSLhgbcVNz3yy7dkw0yf1oIupWjW9Jf:GdfHyX0FlJOahiqdkwjtoI

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1210364331280040016/I1v11HzJ9503bqFhrXwnrML5qOk6sLEdbeU9uI-X_HnYuF3ipDXRAghmdJFNV9ySoE--

Targets

    • Target

      BoostLoader_v1.exe

    • Size

      28KB

    • MD5

      4a68de0bacf7b13aaf73b50bfa30eefb

    • SHA1

      448f7c54c470c1b88922a062984ebef021f86020

    • SHA256

      63398bcbca8131165c25afdf5f04f3cebc5229828efa55d78f0bae7cc82a10f6

    • SHA512

      a28d5a34fd486d205b77cdfec2c857a31510efd2535dfe228c7c8a2c9c797ee8fa531930963f18f6c4bb517a64f66728657461e952b17c8fe40796f252a6877e

    • SSDEEP

      384:IbdmmHyX0F1bgqrSq6iKSLhgbcVNz3yy7dkw0yf1oIupWjW9Jf:GdfHyX0FlJOahiqdkwjtoI

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks