Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 04:43
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240802-en
General
-
Target
Bootstrapper.exe
-
Size
13.2MB
-
MD5
a20c7241b0483b3673b17d42ad9987ea
-
SHA1
45a38459e0dad54433243a45e5b53fdfe48c333a
-
SHA256
0d64d6c344e5278118e4dc6e91036dc2211bae692d36dfd085c47940b42c768e
-
SHA512
2e7131f1f50b15005cee38d5bfcc77a20ad303e45935dc22664f4b49ad8f8ef459331c7089a44b348c4986076367d425c8e9e40aaa04726f39a590ed539af313
-
SSDEEP
393216:S/S0ZYVrwXh0SJamfZ9/2RofvW/sT4iLYCsOZ:ojZYpqWRmfZ4y+/m4ifsOZ
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1272766538968989716/t4bHEulMCc8ZPLSkXHMGfVgD58v1g-K-JZub8tE24Ak0gTGty1chfOxer22lc0KvQs6F
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2500-0-0x0000000001D91000-0x000000000213F000-memory.dmpFilesize
3.7MB
-
memory/2500-1-0x0000000077CE0000-0x0000000077CE2000-memory.dmpFilesize
8KB
-
memory/2500-3-0x0000000077CE0000-0x0000000077CE2000-memory.dmpFilesize
8KB
-
memory/2500-5-0x0000000077CE0000-0x0000000077CE2000-memory.dmpFilesize
8KB
-
memory/2500-6-0x0000000077CF0000-0x0000000077CF2000-memory.dmpFilesize
8KB
-
memory/2500-8-0x0000000077CF0000-0x0000000077CF2000-memory.dmpFilesize
8KB
-
memory/2500-10-0x0000000077CF0000-0x0000000077CF2000-memory.dmpFilesize
8KB
-
memory/2500-13-0x0000000000EC0000-0x0000000002E6D000-memory.dmpFilesize
31.7MB
-
memory/2500-23-0x0000000000EC0000-0x0000000002E6D000-memory.dmpFilesize
31.7MB
-
memory/2500-22-0x0000000001D91000-0x000000000213F000-memory.dmpFilesize
3.7MB
-
memory/2500-24-0x0000000000EC0000-0x0000000002E6D000-memory.dmpFilesize
31.7MB