General
-
Target
BootstrapperNew.exe
-
Size
2.6MB
-
Sample
250222-zddjjsypgj
-
MD5
e50282436ad44eb8ec3e08ecaabec2e0
-
SHA1
1a7e345b90ec4087884185dbd0b40164248ecfd0
-
SHA256
6068e700d44fbc4a38a0bb7b05262da684eb53ae6689fea9dfa5b1411f123922
-
SHA512
e4027dac84e1fa9109426fdf8b52a86e5e1fbf66b64924d2cc132acf2dc4becfc6595076688fef6d0b27b40bc687c4883203524c81b0c01242d7743a713e9eaf
-
SSDEEP
49152:Exkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+PT:EE+YplNwGyNm3Z/x0wCX
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1342855344006893599/eGKFdFfxqqBAzE_z6yEX9OgSrXGjaARgvdEHtEpFWiqqlvMfgcnXVTQiOS26Pz1o69fo
Targets
-
-
Target
BootstrapperNew.exe
-
Size
2.6MB
-
MD5
e50282436ad44eb8ec3e08ecaabec2e0
-
SHA1
1a7e345b90ec4087884185dbd0b40164248ecfd0
-
SHA256
6068e700d44fbc4a38a0bb7b05262da684eb53ae6689fea9dfa5b1411f123922
-
SHA512
e4027dac84e1fa9109426fdf8b52a86e5e1fbf66b64924d2cc132acf2dc4becfc6595076688fef6d0b27b40bc687c4883203524c81b0c01242d7743a713e9eaf
-
SSDEEP
49152:Exkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+PT:EE+YplNwGyNm3Z/x0wCX
Score10/10-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-