General

  • Target

    BootstrapperV1.15.exe

  • Size

    796KB

  • Sample

    240808-t625qawdkp

  • MD5

    653c07b9b5f1b22c84f72c03b0083d18

  • SHA1

    54c25b876736011d016dc0ea06a1533365555cc4

  • SHA256

    c9d04a3a87fee318ba65f837f40bd2dd2428f25e78bf271207f8b2b02aaa8a06

  • SHA512

    b605773fc4fa244f354bb8f51621225e6482751d19bddf747f03f624581bc7ae896ca0e40be91b667aea7a7978a291497a362f9bd65449682e1948938af684f8

  • SSDEEP

    12288:wuHbakEAdS7SdsgtNaFoGQ4jEr+xpS1nmkFmZ2ojKU:/HbTHSINooGQ4jESxpS1nmkkK

Malware Config

Targets

    • Target

      BootstrapperV1.15.exe

    • Size

      796KB

    • MD5

      653c07b9b5f1b22c84f72c03b0083d18

    • SHA1

      54c25b876736011d016dc0ea06a1533365555cc4

    • SHA256

      c9d04a3a87fee318ba65f837f40bd2dd2428f25e78bf271207f8b2b02aaa8a06

    • SHA512

      b605773fc4fa244f354bb8f51621225e6482751d19bddf747f03f624581bc7ae896ca0e40be91b667aea7a7978a291497a362f9bd65449682e1948938af684f8

    • SSDEEP

      12288:wuHbakEAdS7SdsgtNaFoGQ4jEr+xpS1nmkFmZ2ojKU:/HbTHSINooGQ4jESxpS1nmkkK

    • Modifies WinLogon for persistence

    • UAC bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks