General
-
Target
BootstrapperNew.exe
-
Size
2.5MB
-
Sample
250223-1l79kaxpt4
-
MD5
34d432e798ab3b52bc4af41be6f1d014
-
SHA1
2bb6fbd86e63c40f088ed77a27be6402be96d7ce
-
SHA256
dc5abd691589fe6086d88e1a673c0194315d9862e23d04c33b53c98f16f5940c
-
SHA512
66073c887bcec7fcfd73a12b8ea1a4bda88672f40fa47f41beac0ecb7724940a5c72fcff64ab4dd56788d38b2b16f2923468e4bd9c01b4e72757fffa0ca74bce
-
SSDEEP
49152:txkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+Pt7Ld:tE+YplNwGyNm3Z/x0wCXq
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1343311120542203995/vhngKTCVfZJyDIS1ApzUQsvaS_ZaYsL3rmqMhHnf1lLMcgKd60j4i11JkQ1NYiPLtW5J
Targets
-
-
Target
BootstrapperNew.exe
-
Size
2.5MB
-
MD5
34d432e798ab3b52bc4af41be6f1d014
-
SHA1
2bb6fbd86e63c40f088ed77a27be6402be96d7ce
-
SHA256
dc5abd691589fe6086d88e1a673c0194315d9862e23d04c33b53c98f16f5940c
-
SHA512
66073c887bcec7fcfd73a12b8ea1a4bda88672f40fa47f41beac0ecb7724940a5c72fcff64ab4dd56788d38b2b16f2923468e4bd9c01b4e72757fffa0ca74bce
-
SSDEEP
49152:txkczo+Et3EczvDrtkm3wmTwGyNqXhp3z182x0r8HQ4PhrYLg8hVYMz+Pt7Ld:tE+YplNwGyNm3Z/x0wCXq
Score10/10-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-