General

  • Target

    CrypticBootstrapper.exe

  • Size

    235KB

  • MD5

    6a8d9640dcb9e7b51794c51e55cab5ff

  • SHA1

    dcb26de3de2b816e231162e1f73837ec94389e85

  • SHA256

    42f2488da10b923080e378bb6a992a10e8fdb1631023e272d849a0c9d240d73d

  • SHA512

    60b54772d14656f050f228a68446d0344136d861acfb13c59556f12072c0a455a0f589834da17feb962293917262d6ec0d3ed6b6d14904b377b842eb389cd96e

  • SSDEEP

    6144:jloZMcrIkd8g+EtXHkv/iD4dpPtDHdmOh8U9va6vnrRb8e1m/bi:BoZzL+EP8fPtDHdmOh8U9va6vn9s2

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1336703586125746186/805EPsSUzTijUYmnONcE-QH4YQ7aUftiUsMOcKdpAUAAyrAJCCqU0pcxF_bCPGF2Vtxi

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • CrypticBootstrapper.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections