General

  • Target

    Bootstrapper.exe

  • Size

    797KB

  • Sample

    240807-b3kr6axckq

  • MD5

    86bf094b70901e55a281e0a0683dd8b3

  • SHA1

    24afc916d186facaf7885363bf335e3e5b7d69b9

  • SHA256

    2a4255d739e42838d49159d7228952b512a2c8ccb6f4b0c8d35543912130dac6

  • SHA512

    2f33349c13f7778869f4e200380acd9c12e41a981a30005ad01aa8c29442d9bfdfb2a76a1b589be1efb2e4a314cbdf92f691a12b0fa487af4160e7d87ff25e56

  • SSDEEP

    12288:e/+ubxKHJg5bbEjlsqRoAQpjFVfG0c4XqCon9hUpVo34u:Q+ubYHYqRoAQpjFVG0HXqlF4u

Score
8/10

Malware Config

Targets

    • Target

      Bootstrapper.exe

    • Size

      797KB

    • MD5

      86bf094b70901e55a281e0a0683dd8b3

    • SHA1

      24afc916d186facaf7885363bf335e3e5b7d69b9

    • SHA256

      2a4255d739e42838d49159d7228952b512a2c8ccb6f4b0c8d35543912130dac6

    • SHA512

      2f33349c13f7778869f4e200380acd9c12e41a981a30005ad01aa8c29442d9bfdfb2a76a1b589be1efb2e4a314cbdf92f691a12b0fa487af4160e7d87ff25e56

    • SSDEEP

      12288:e/+ubxKHJg5bbEjlsqRoAQpjFVfG0c4XqCon9hUpVo34u:Q+ubYHYqRoAQpjFVG0HXqlF4u

    Score
    8/10
    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks