General

  • Target

    Bootstrapper.exe

  • Size

    494KB

  • MD5

    b80c04df4f7fd690ce34cf65b30ab204

  • SHA1

    c9348af979d56319086f1448d0681def08da6430

  • SHA256

    3a1b731d964fa9378d37657812ded01ae6a97b15eb114063555045334eee4c26

  • SHA512

    04d0f4399141e44a9ba9579e7d161678f5f9ce8f9b9011ed95e5b239256765ea8fbc989bafb75bc428e330e815359633c8b7438cca603b9849da2cc27eb82fc7

  • SSDEEP

    12288:VoZ0L+EP8N6zJW0b3cQNImHHmr0HcPTywWQ+Ples:QI8MzJW0b3cQNImHHmr0iOwWL

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1254852484468314153/io2pZkFO55QEWZQlG3WzyX7OHzDo9oR7EJm-7aZgKDExigDmYNEwVG2mFVpZn-t7qaDc

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Bootstrapper.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections