General
-
Target
Bootstrapper (1).exe
-
Size
797KB
-
Sample
240811-19yp2awbnf
-
MD5
86bf094b70901e55a281e0a0683dd8b3
-
SHA1
24afc916d186facaf7885363bf335e3e5b7d69b9
-
SHA256
2a4255d739e42838d49159d7228952b512a2c8ccb6f4b0c8d35543912130dac6
-
SHA512
2f33349c13f7778869f4e200380acd9c12e41a981a30005ad01aa8c29442d9bfdfb2a76a1b589be1efb2e4a314cbdf92f691a12b0fa487af4160e7d87ff25e56
-
SSDEEP
12288:e/+ubxKHJg5bbEjlsqRoAQpjFVfG0c4XqCon9hUpVo34u:Q+ubYHYqRoAQpjFVG0HXqlF4u
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper (1).exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Bootstrapper (1).exe
-
Size
797KB
-
MD5
86bf094b70901e55a281e0a0683dd8b3
-
SHA1
24afc916d186facaf7885363bf335e3e5b7d69b9
-
SHA256
2a4255d739e42838d49159d7228952b512a2c8ccb6f4b0c8d35543912130dac6
-
SHA512
2f33349c13f7778869f4e200380acd9c12e41a981a30005ad01aa8c29442d9bfdfb2a76a1b589be1efb2e4a314cbdf92f691a12b0fa487af4160e7d87ff25e56
-
SSDEEP
12288:e/+ubxKHJg5bbEjlsqRoAQpjFVfG0c4XqCon9hUpVo34u:Q+ubYHYqRoAQpjFVG0HXqlF4u
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-