General

  • Target

    Bootstrapper (1).exe

  • Size

    797KB

  • Sample

    240811-19yp2awbnf

  • MD5

    86bf094b70901e55a281e0a0683dd8b3

  • SHA1

    24afc916d186facaf7885363bf335e3e5b7d69b9

  • SHA256

    2a4255d739e42838d49159d7228952b512a2c8ccb6f4b0c8d35543912130dac6

  • SHA512

    2f33349c13f7778869f4e200380acd9c12e41a981a30005ad01aa8c29442d9bfdfb2a76a1b589be1efb2e4a314cbdf92f691a12b0fa487af4160e7d87ff25e56

  • SSDEEP

    12288:e/+ubxKHJg5bbEjlsqRoAQpjFVfG0c4XqCon9hUpVo34u:Q+ubYHYqRoAQpjFVG0HXqlF4u

Score
7/10

Malware Config

Targets

    • Target

      Bootstrapper (1).exe

    • Size

      797KB

    • MD5

      86bf094b70901e55a281e0a0683dd8b3

    • SHA1

      24afc916d186facaf7885363bf335e3e5b7d69b9

    • SHA256

      2a4255d739e42838d49159d7228952b512a2c8ccb6f4b0c8d35543912130dac6

    • SHA512

      2f33349c13f7778869f4e200380acd9c12e41a981a30005ad01aa8c29442d9bfdfb2a76a1b589be1efb2e4a314cbdf92f691a12b0fa487af4160e7d87ff25e56

    • SSDEEP

      12288:e/+ubxKHJg5bbEjlsqRoAQpjFVfG0c4XqCon9hUpVo34u:Q+ubYHYqRoAQpjFVG0HXqlF4u

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks