General

  • Target

    Bootstrapper.exe

  • Size

    34.6MB

  • Sample

    240810-l3zlesyfrb

  • MD5

    df0ab2d4902ef9656390bec48521185c

  • SHA1

    e4dff6c1ec8963596632ac4a980b665b15edcdee

  • SHA256

    6cd56a24ad78edb236a535ccb3bae21a97524c608e7cca87f65177868f72a11a

  • SHA512

    8c2cc016b1057f3980063c940a009e785603164de0022b75ed1da26dbab6c26abe59f4e347500de826b0a75e2e58c05892cf2b9993690947a5f66eac2abe0ad0

  • SSDEEP

    786432:69AOQNq7vDUdbSKvIACT6ESWqEjMT7/I3TyPxG:sAOQw7v4dhvIxlq1wiE

Malware Config

Targets

    • Target

      Bootstrapper.exe

    • Size

      34.6MB

    • MD5

      df0ab2d4902ef9656390bec48521185c

    • SHA1

      e4dff6c1ec8963596632ac4a980b665b15edcdee

    • SHA256

      6cd56a24ad78edb236a535ccb3bae21a97524c608e7cca87f65177868f72a11a

    • SHA512

      8c2cc016b1057f3980063c940a009e785603164de0022b75ed1da26dbab6c26abe59f4e347500de826b0a75e2e58c05892cf2b9993690947a5f66eac2abe0ad0

    • SSDEEP

      786432:69AOQNq7vDUdbSKvIACT6ESWqEjMT7/I3TyPxG:sAOQw7v4dhvIxlq1wiE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks