General

  • Target

    Boostrapper.exe

  • Size

    46.0MB

  • Sample

    240821-drbq8axdqa

  • MD5

    493beeed91039ed0113494af5f893735

  • SHA1

    83ec00f53238de480f4878eca7946d06044528c5

  • SHA256

    128ccb35e5917e63b851fffc587d5ec1ef664699cf0d71b386c6bdd1ec68169c

  • SHA512

    923c76b418c74921261e126d8eae259a2d4111a1a7e5533cd169022c9014c87c64aa936a47a8dceab9e8c36309a466fa4a4efc9018456dcb0c6244a3e6d9f4b1

  • SSDEEP

    786432:qjLJhGxlQ2Y0WwV4ebtzWamoXi+39uMnrmACrjdWI/cXqZrVy/pW6K7:ah6QiVJbcoXiuRnqAywYcO6HK7

Malware Config

Targets

    • Target

      Boostrapper.exe

    • Size

      46.0MB

    • MD5

      493beeed91039ed0113494af5f893735

    • SHA1

      83ec00f53238de480f4878eca7946d06044528c5

    • SHA256

      128ccb35e5917e63b851fffc587d5ec1ef664699cf0d71b386c6bdd1ec68169c

    • SHA512

      923c76b418c74921261e126d8eae259a2d4111a1a7e5533cd169022c9014c87c64aa936a47a8dceab9e8c36309a466fa4a4efc9018456dcb0c6244a3e6d9f4b1

    • SSDEEP

      786432:qjLJhGxlQ2Y0WwV4ebtzWamoXi+39uMnrmACrjdWI/cXqZrVy/pW6K7:ah6QiVJbcoXiuRnqAywYcO6HK7

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks