Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240730-en
General
-
Target
Bootstrapper.exe
-
Size
494KB
-
MD5
b80c04df4f7fd690ce34cf65b30ab204
-
SHA1
c9348af979d56319086f1448d0681def08da6430
-
SHA256
3a1b731d964fa9378d37657812ded01ae6a97b15eb114063555045334eee4c26
-
SHA512
04d0f4399141e44a9ba9579e7d161678f5f9ce8f9b9011ed95e5b239256765ea8fbc989bafb75bc428e330e815359633c8b7438cca603b9849da2cc27eb82fc7
-
SSDEEP
12288:VoZ0L+EP8N6zJW0b3cQNImHHmr0HcPTywWQ+Ples:QI8MzJW0b3cQNImHHmr0iOwWL
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1254852484468314153/io2pZkFO55QEWZQlG3WzyX7OHzDo9oR7EJm-7aZgKDExigDmYNEwVG2mFVpZn-t7qaDc
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule sample family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Bootstrapper.exe
Files
-
Bootstrapper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ