General

  • Target

    BoosterX.exe

  • Size

    7.5MB

  • Sample

    231013-zmpceahh4y

  • MD5

    f2fdc7bea03aad5cbcde1b900c88e470

  • SHA1

    4cd094d470d8089e072039806f3cad22d81fe08a

  • SHA256

    df8c60ee93fda3b2e71dfb993be79ce47b57dc2613d9ce621afc50c52d5aa51d

  • SHA512

    aab29e3d621fc46f57854d497d7e5d09ece090a34b387f35bb232713122d372a7d32506ce62b17498b57f393cec7d0da06ce60ad3ebfc8727e641dd90d597f11

  • SSDEEP

    98304:v0B1ezhQ/sb+sX1ZvbeeJZ34Z0FGRABTgtse6vzovk9Lr8++Msbe4PfaASZA6YHf:v0khQECsXDjpf3ZkJMJrAZzEA6Hy

Malware Config

Targets

    • Target

      BoosterX.exe

    • Size

      7.5MB

    • MD5

      f2fdc7bea03aad5cbcde1b900c88e470

    • SHA1

      4cd094d470d8089e072039806f3cad22d81fe08a

    • SHA256

      df8c60ee93fda3b2e71dfb993be79ce47b57dc2613d9ce621afc50c52d5aa51d

    • SHA512

      aab29e3d621fc46f57854d497d7e5d09ece090a34b387f35bb232713122d372a7d32506ce62b17498b57f393cec7d0da06ce60ad3ebfc8727e641dd90d597f11

    • SSDEEP

      98304:v0B1ezhQ/sb+sX1ZvbeeJZ34Z0FGRABTgtse6vzovk9Lr8++Msbe4PfaASZA6YHf:v0khQECsXDjpf3ZkJMJrAZzEA6Hy

    Score
    10/10
    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks