Overview
overview
10Static
static
10BootstrapperV1.16.exe
windows7-x64
7BootstrapperV1.16.exe
windows10-1703-x64
10BootstrapperV1.16.exe
windows10-2004-x64
9BootstrapperV1.16.exe
windows11-21h2-x64
9loader-o.pyc
windows7-x64
3loader-o.pyc
windows10-1703-x64
3loader-o.pyc
windows10-2004-x64
3loader-o.pyc
windows11-21h2-x64
3General
-
Target
BootstrapperV1.16.exe
-
Size
7.5MB
-
Sample
240822-b78d1ssdke
-
MD5
d07874e5e697293369d47f6727787711
-
SHA1
50b44591caf4de65d9abf7b6c9b4e1b3ffab549e
-
SHA256
3b5869397c4daaf4badca0590254e90e09d3e25373524d2952ae815432b35338
-
SHA512
2aff151b97d1928375f02175e28dcc24fc293fdfa0f44fa3b5a114914c378fce54af54bd96802063470b10ede717715547488c9695e8e33990a51043b375643e
-
SSDEEP
196608:mHhByurErvI9pWjg/Qc+4o673pNrabewyzWGPMYnN9s:KyurEUWjZZ4dDLIeTzWGPTNC
Behavioral task
behavioral1
Sample
BootstrapperV1.16.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BootstrapperV1.16.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
BootstrapperV1.16.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
BootstrapperV1.16.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
loader-o.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
loader-o.pyc
Resource
win10-20240611-en
Behavioral task
behavioral7
Sample
loader-o.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
loader-o.pyc
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
BootstrapperV1.16.exe
-
Size
7.5MB
-
MD5
d07874e5e697293369d47f6727787711
-
SHA1
50b44591caf4de65d9abf7b6c9b4e1b3ffab549e
-
SHA256
3b5869397c4daaf4badca0590254e90e09d3e25373524d2952ae815432b35338
-
SHA512
2aff151b97d1928375f02175e28dcc24fc293fdfa0f44fa3b5a114914c378fce54af54bd96802063470b10ede717715547488c9695e8e33990a51043b375643e
-
SSDEEP
196608:mHhByurErvI9pWjg/Qc+4o673pNrabewyzWGPMYnN9s:KyurEUWjZZ4dDLIeTzWGPTNC
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
loader-o.pyc
-
Size
1KB
-
MD5
8358a3f101bf92a60a415708dac86567
-
SHA1
65c56453a4244b1df554ed62893a9b1a9440c6b8
-
SHA256
640cb2aab4823221445741e72b36b792a21780cd39cec6de960d0175e651b7ad
-
SHA512
dc1afe637a7942689b3400326e7af731a0c32d608ab76ec47f480c949a143fd22e32a9a231e28d4572bad4bf17b31fee353fb4d6866541ed23244ab54e3a397f
Score3/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3