General
-
Target
SolaraBootstrapper.exe
-
Size
230KB
-
Sample
240713-jqy31svcpc
-
MD5
29fc973f5ba727abf85edfb4ee46d81c
-
SHA1
c18c0265b2539201f7502229da8dee2efb5b5e11
-
SHA256
f764ca094bf86a91474cde7969cec7cdd4a5f28985888b36cda9b674c53876e0
-
SHA512
433f49e1b5fba7a36b5fad4e91816d4200ee984dcedc97c8bf3e5369e327e7c7eb09dcd849394f219eeb8dc3a353c41b26af05c40fbfe93dfd0773e0474d4810
-
SSDEEP
6144:DloZM+rIkd8g+EtXHkv/iD4NJRErDJ6idxIJbGmT/hb8e1mfFdi:hoZtL+EP8NJRErDJ6idxIJbGmTxeC
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win10-20240611-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1261235663127187457/Szq-6qIh5C_x0sv5DG5enhnVtKsgIs2qwGeX4Ci6llSMKlP-Z6-kQTGPQW0PEzZOZWmN
Targets
-
-
Target
SolaraBootstrapper.exe
-
Size
230KB
-
MD5
29fc973f5ba727abf85edfb4ee46d81c
-
SHA1
c18c0265b2539201f7502229da8dee2efb5b5e11
-
SHA256
f764ca094bf86a91474cde7969cec7cdd4a5f28985888b36cda9b674c53876e0
-
SHA512
433f49e1b5fba7a36b5fad4e91816d4200ee984dcedc97c8bf3e5369e327e7c7eb09dcd849394f219eeb8dc3a353c41b26af05c40fbfe93dfd0773e0474d4810
-
SSDEEP
6144:DloZM+rIkd8g+EtXHkv/iD4NJRErDJ6idxIJbGmT/hb8e1mfFdi:hoZtL+EP8NJRErDJ6idxIJbGmTxeC
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-