General

  • Target

    WindowsBootManager.exe

  • Size

    72.1MB

  • Sample

    240222-xecyasdg9s

  • MD5

    cf436bf4454ed08cc5de148ed7bc6f16

  • SHA1

    bb4ed4da6cfcbdeb8540faf0c417997fb5f75948

  • SHA256

    a0eef52884827e84b0134dca14cabfb613e557f0ad36ad7f1829b1e78167d232

  • SHA512

    233790c01a3ff24f94d4a60a27a19cdc698a7eb935a4332218f624306c6beb52682273bbe1ea9e0d3b686202a1652f46518311ba7ecc192d6059eaa785c08c32

  • SSDEEP

    1572864:HejOS3zH2cEUH3UVXAgneMGXXA/T1eBZGURkmiQgMpk:HNcEVVEnHMT1eNrL7pk

Score
10/10

Malware Config

Targets

    • Target

      WindowsBootManager.exe

    • Size

      72.1MB

    • MD5

      cf436bf4454ed08cc5de148ed7bc6f16

    • SHA1

      bb4ed4da6cfcbdeb8540faf0c417997fb5f75948

    • SHA256

      a0eef52884827e84b0134dca14cabfb613e557f0ad36ad7f1829b1e78167d232

    • SHA512

      233790c01a3ff24f94d4a60a27a19cdc698a7eb935a4332218f624306c6beb52682273bbe1ea9e0d3b686202a1652f46518311ba7ecc192d6059eaa785c08c32

    • SSDEEP

      1572864:HejOS3zH2cEUH3UVXAgneMGXXA/T1eBZGURkmiQgMpk:HNcEVVEnHMT1eNrL7pk

    Score
    10/10
    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      WindowsBootManager.exe

    • Size

      168.6MB

    • MD5

      fe346097bd22eacee430efc772fa9e56

    • SHA1

      fcedffd8a4755e0a300f355ea58cff79618317a8

    • SHA256

      0a99d4c33d0d416cced5b9d0b258e350857f5895a52904e87915c8d1ef9f89a6

    • SHA512

      16667197c3f8bb788df3e5eeb52da48b9755d42caa398489c91b85069dfffe8d75f8c610c3888a33fc44e1128ae8f75a81fd693659275116ff511a0620b97efd

    • SSDEEP

      1572864:sXic4qb6IXgDaJfpEQHgelkLK4z34xGWw0TwW1T/qWhehZvmCtS3JPfyzG49FndX:yVKvWZ8tyx4u

    Score
    10/10
    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks