General

  • Target

    SolaraBoostrap .exe

  • Size

    229KB

  • MD5

    b7741b6a5e172eff7edfdc9ab19a649f

  • SHA1

    9c80488d840a98dac3860e21f1fa6be89cc3e898

  • SHA256

    7f1e40b82781c6149dd6f963e81636d226fc993f11e0c842f0df1b3e7a10caf8

  • SHA512

    d1e8a4005dd8554a45434568025a19270c871e778fb640daf7eefcb9aaf11a487c5b6c68d88572727888adf7207b0cafc9f97021557ce4c8437afa6750714552

  • SSDEEP

    6144:tloZMNrIkd8g+EtXHkv/iD4gnEt5nsAvcOXZkQlTLb8e1msi:voZ2L+EP8gnEt5nsAvcOXZkQljW

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1242894085392568363/FhGhdyPJefyLDfUPdOOham6cLZKHBijqUa_c9wnXWQFBGqBESeRcsETkQ6t9yxrSoPTR

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SolaraBoostrap .exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections