General
-
Target
CrypticBootstrapper.exe
-
Size
234KB
-
Sample
250203-rkscaavnfl
-
MD5
e8ad07562f0bc1b8d7f48f6d5bd40bfc
-
SHA1
9aec9c702c4a697885edee682fc8602c73da9fa7
-
SHA256
1d2764e360259d54a4685745c8264295be898a4d208f405702ff2f8a2200114f
-
SHA512
1c874371239a5e90c35311cbead9474348dbaf3d548c2273c0b2a65e171cd93cc1c8e4f52c3f9c60f3af89dbf2f73743d0fc32980fff0bc0869957fa4670a870
-
SSDEEP
6144:TloZMLrIkd8g+EtXHkv/iD4AAMXdLocDFabtIExslb8e1mwdIi:RoZ0L+EP8AAMXdLocDFabtIEx4z
Behavioral task
behavioral1
Sample
CrypticBootstrapper.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1335714213418766427/qomZLLimtf4qGu-EW_HDiFrwaxFX2jsdlA0xdwhfy9Lp3SehJYT8AAigbDxKAsRg6Oab
Targets
-
-
Target
CrypticBootstrapper.exe
-
Size
234KB
-
MD5
e8ad07562f0bc1b8d7f48f6d5bd40bfc
-
SHA1
9aec9c702c4a697885edee682fc8602c73da9fa7
-
SHA256
1d2764e360259d54a4685745c8264295be898a4d208f405702ff2f8a2200114f
-
SHA512
1c874371239a5e90c35311cbead9474348dbaf3d548c2273c0b2a65e171cd93cc1c8e4f52c3f9c60f3af89dbf2f73743d0fc32980fff0bc0869957fa4670a870
-
SSDEEP
6144:TloZMLrIkd8g+EtXHkv/iD4AAMXdLocDFabtIExslb8e1mwdIi:RoZ0L+EP8AAMXdLocDFabtIEx4z
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-