General
-
Target
CrypticBootstrapper.exe
-
Size
235KB
-
Sample
250205-zda4estkfm
-
MD5
6a8d9640dcb9e7b51794c51e55cab5ff
-
SHA1
dcb26de3de2b816e231162e1f73837ec94389e85
-
SHA256
42f2488da10b923080e378bb6a992a10e8fdb1631023e272d849a0c9d240d73d
-
SHA512
60b54772d14656f050f228a68446d0344136d861acfb13c59556f12072c0a455a0f589834da17feb962293917262d6ec0d3ed6b6d14904b377b842eb389cd96e
-
SSDEEP
6144:jloZMcrIkd8g+EtXHkv/iD4dpPtDHdmOh8U9va6vnrRb8e1m/bi:BoZzL+EP8fPtDHdmOh8U9va6vn9s2
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1336703586125746186/805EPsSUzTijUYmnONcE-QH4YQ7aUftiUsMOcKdpAUAAyrAJCCqU0pcxF_bCPGF2Vtxi
Targets
-
-
Target
CrypticBootstrapper.exe
-
Size
235KB
-
MD5
6a8d9640dcb9e7b51794c51e55cab5ff
-
SHA1
dcb26de3de2b816e231162e1f73837ec94389e85
-
SHA256
42f2488da10b923080e378bb6a992a10e8fdb1631023e272d849a0c9d240d73d
-
SHA512
60b54772d14656f050f228a68446d0344136d861acfb13c59556f12072c0a455a0f589834da17feb962293917262d6ec0d3ed6b6d14904b377b842eb389cd96e
-
SSDEEP
6144:jloZMcrIkd8g+EtXHkv/iD4dpPtDHdmOh8U9va6vnrRb8e1m/bi:BoZzL+EP8fPtDHdmOh8U9va6vn9s2
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-