General
-
Target
boosttool1.exe
-
Size
411KB
-
Sample
250414-d2216ayjs8
-
MD5
3744fcd13385f8698aefbd25458b555f
-
SHA1
3ad84176dd5b9a3196fa278be1e8e5ef508ddd21
-
SHA256
fb0e0f437401fbdf3802b3399fd3705100db1c5859680b2240a1f794d48997d7
-
SHA512
16a75080102d960f09b904037ee16db0c5bcfa16e551c1450e03bf12bac4908d0516ded36158bab3a165894529144705d69647aebb716882b3e5b1946b3a0a0c
-
SSDEEP
12288:soZtL+EP8huEPecjfUB1gevPeg/x4s5dMk:kI8wEPecjfUB1gevPegPMk
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1361161788237942885/r5Ze6PWf97p9EiM1n9IQfZBllJYAOKndFw3T_MhDk4ghrBGnZxKfzwzHVt1jearLugto
Targets
-
-
Target
boosttool1.exe
-
Size
411KB
-
MD5
3744fcd13385f8698aefbd25458b555f
-
SHA1
3ad84176dd5b9a3196fa278be1e8e5ef508ddd21
-
SHA256
fb0e0f437401fbdf3802b3399fd3705100db1c5859680b2240a1f794d48997d7
-
SHA512
16a75080102d960f09b904037ee16db0c5bcfa16e551c1450e03bf12bac4908d0516ded36158bab3a165894529144705d69647aebb716882b3e5b1946b3a0a0c
-
SSDEEP
12288:soZtL+EP8huEPecjfUB1gevPeg/x4s5dMk:kI8wEPecjfUB1gevPegPMk
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1