General
-
Target
Bootstrapper.exe
-
Size
494KB
-
Sample
240731-sg6aeazbmq
-
MD5
b80c04df4f7fd690ce34cf65b30ab204
-
SHA1
c9348af979d56319086f1448d0681def08da6430
-
SHA256
3a1b731d964fa9378d37657812ded01ae6a97b15eb114063555045334eee4c26
-
SHA512
04d0f4399141e44a9ba9579e7d161678f5f9ce8f9b9011ed95e5b239256765ea8fbc989bafb75bc428e330e815359633c8b7438cca603b9849da2cc27eb82fc7
-
SSDEEP
12288:VoZ0L+EP8N6zJW0b3cQNImHHmr0HcPTywWQ+Ples:QI8MzJW0b3cQNImHHmr0iOwWL
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1254852484468314153/io2pZkFO55QEWZQlG3WzyX7OHzDo9oR7EJm-7aZgKDExigDmYNEwVG2mFVpZn-t7qaDc
Targets
-
-
Target
Bootstrapper.exe
-
Size
494KB
-
MD5
b80c04df4f7fd690ce34cf65b30ab204
-
SHA1
c9348af979d56319086f1448d0681def08da6430
-
SHA256
3a1b731d964fa9378d37657812ded01ae6a97b15eb114063555045334eee4c26
-
SHA512
04d0f4399141e44a9ba9579e7d161678f5f9ce8f9b9011ed95e5b239256765ea8fbc989bafb75bc428e330e815359633c8b7438cca603b9849da2cc27eb82fc7
-
SSDEEP
12288:VoZ0L+EP8N6zJW0b3cQNImHHmr0HcPTywWQ+Ples:QI8MzJW0b3cQNImHHmr0iOwWL
Score10/10-
Detect Umbral payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-