General
-
Target
Boostrapper-V3.exe
-
Size
46.3MB
-
Sample
240814-qkkf1ayfqn
-
MD5
2a08574a95ab861f71843d3292099e34
-
SHA1
87963a8282060b99258570927c223633bd08b5d3
-
SHA256
5a4cbc93367751df1ac029344e512ce5a6fa3fe011b7126cebfaa2c745b01eca
-
SHA512
de01b5b8d5f9e2e32061d8e8bb32e8a4301d4f4d44e5fad40e569715be4dcdda4156585d908c7a505d5e4222755fe4ce85a52628f874abda003ffd9511ac6231
-
SSDEEP
786432:9ZT+aZaAj45d0zuKrjHL3y6lM7EsjyGnDyaK9dYK8F0FD77/pYMOalq9xy/pW6KM:z+lp2zZrn31mgepn+al277/G2lq9SHKM
Behavioral task
behavioral1
Sample
Boostrapper-V3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Boostrapper-V3.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Boostrapper-V3.exe
-
Size
46.3MB
-
MD5
2a08574a95ab861f71843d3292099e34
-
SHA1
87963a8282060b99258570927c223633bd08b5d3
-
SHA256
5a4cbc93367751df1ac029344e512ce5a6fa3fe011b7126cebfaa2c745b01eca
-
SHA512
de01b5b8d5f9e2e32061d8e8bb32e8a4301d4f4d44e5fad40e569715be4dcdda4156585d908c7a505d5e4222755fe4ce85a52628f874abda003ffd9511ac6231
-
SSDEEP
786432:9ZT+aZaAj45d0zuKrjHL3y6lM7EsjyGnDyaK9dYK8F0FD77/pYMOalq9xy/pW6KM:z+lp2zZrn31mgepn+al277/G2lq9SHKM
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-