General

  • Target

    BootstrapperV3.exe

  • Size

    6.0MB

  • Sample

    240808-max3kawbrf

  • MD5

    d4563afdf3d935b5e687b869202e5a2b

  • SHA1

    55109c325015a6301186c5685e2bc872b4a36f7a

  • SHA256

    c5e1d008c3ad103e2759906170b28464bf9cc2a21dbac3d022e31cc660f1fd90

  • SHA512

    6937ee81dc84ffebf5008dd75082903d2ebdd7d79977ffa97b8e6e7799ebb20a040a839da4f9cb523316b613a3fa662d8c2dfa971b8d41f8ed2888a3afee5fed

  • SSDEEP

    98304:p4Iu4+Dc0txamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HmMde3qv4P:pzp+DweNoInY7/sHfbRy9ZdAP

Malware Config

Targets

    • Target

      BootstrapperV3.exe

    • Size

      6.0MB

    • MD5

      d4563afdf3d935b5e687b869202e5a2b

    • SHA1

      55109c325015a6301186c5685e2bc872b4a36f7a

    • SHA256

      c5e1d008c3ad103e2759906170b28464bf9cc2a21dbac3d022e31cc660f1fd90

    • SHA512

      6937ee81dc84ffebf5008dd75082903d2ebdd7d79977ffa97b8e6e7799ebb20a040a839da4f9cb523316b613a3fa662d8c2dfa971b8d41f8ed2888a3afee5fed

    • SSDEEP

      98304:p4Iu4+Dc0txamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HmMde3qv4P:pzp+DweNoInY7/sHfbRy9ZdAP

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks