General

  • Target

    CrypticBootstrapper.exe

  • Size

    234KB

  • Sample

    250203-rkscaavnfl

  • MD5

    e8ad07562f0bc1b8d7f48f6d5bd40bfc

  • SHA1

    9aec9c702c4a697885edee682fc8602c73da9fa7

  • SHA256

    1d2764e360259d54a4685745c8264295be898a4d208f405702ff2f8a2200114f

  • SHA512

    1c874371239a5e90c35311cbead9474348dbaf3d548c2273c0b2a65e171cd93cc1c8e4f52c3f9c60f3af89dbf2f73743d0fc32980fff0bc0869957fa4670a870

  • SSDEEP

    6144:TloZMLrIkd8g+EtXHkv/iD4AAMXdLocDFabtIExslb8e1mwdIi:RoZ0L+EP8AAMXdLocDFabtIEx4z

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1335714213418766427/qomZLLimtf4qGu-EW_HDiFrwaxFX2jsdlA0xdwhfy9Lp3SehJYT8AAigbDxKAsRg6Oab

Targets

    • Target

      CrypticBootstrapper.exe

    • Size

      234KB

    • MD5

      e8ad07562f0bc1b8d7f48f6d5bd40bfc

    • SHA1

      9aec9c702c4a697885edee682fc8602c73da9fa7

    • SHA256

      1d2764e360259d54a4685745c8264295be898a4d208f405702ff2f8a2200114f

    • SHA512

      1c874371239a5e90c35311cbead9474348dbaf3d548c2273c0b2a65e171cd93cc1c8e4f52c3f9c60f3af89dbf2f73743d0fc32980fff0bc0869957fa4670a870

    • SSDEEP

      6144:TloZMLrIkd8g+EtXHkv/iD4AAMXdLocDFabtIExslb8e1mwdIi:RoZ0L+EP8AAMXdLocDFabtIEx4z

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks