General

  • Target

    Boostrapper-V3.exe

  • Size

    46.3MB

  • Sample

    240814-qkkf1ayfqn

  • MD5

    2a08574a95ab861f71843d3292099e34

  • SHA1

    87963a8282060b99258570927c223633bd08b5d3

  • SHA256

    5a4cbc93367751df1ac029344e512ce5a6fa3fe011b7126cebfaa2c745b01eca

  • SHA512

    de01b5b8d5f9e2e32061d8e8bb32e8a4301d4f4d44e5fad40e569715be4dcdda4156585d908c7a505d5e4222755fe4ce85a52628f874abda003ffd9511ac6231

  • SSDEEP

    786432:9ZT+aZaAj45d0zuKrjHL3y6lM7EsjyGnDyaK9dYK8F0FD77/pYMOalq9xy/pW6KM:z+lp2zZrn31mgepn+al277/G2lq9SHKM

Malware Config

Targets

    • Target

      Boostrapper-V3.exe

    • Size

      46.3MB

    • MD5

      2a08574a95ab861f71843d3292099e34

    • SHA1

      87963a8282060b99258570927c223633bd08b5d3

    • SHA256

      5a4cbc93367751df1ac029344e512ce5a6fa3fe011b7126cebfaa2c745b01eca

    • SHA512

      de01b5b8d5f9e2e32061d8e8bb32e8a4301d4f4d44e5fad40e569715be4dcdda4156585d908c7a505d5e4222755fe4ce85a52628f874abda003ffd9511ac6231

    • SSDEEP

      786432:9ZT+aZaAj45d0zuKrjHL3y6lM7EsjyGnDyaK9dYK8F0FD77/pYMOalq9xy/pW6KM:z+lp2zZrn31mgepn+al277/G2lq9SHKM

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks