Resubmissions

22/08/2024, 01:53

240822-ca4v1asepb 10

22/08/2024, 01:52

240822-cafs6sselc 10

22/08/2024, 01:48

240822-b78d1ssdke 10

General

  • Target

    BootstrapperV1.16.exe

  • Size

    7.5MB

  • Sample

    240822-ca4v1asepb

  • MD5

    d07874e5e697293369d47f6727787711

  • SHA1

    50b44591caf4de65d9abf7b6c9b4e1b3ffab549e

  • SHA256

    3b5869397c4daaf4badca0590254e90e09d3e25373524d2952ae815432b35338

  • SHA512

    2aff151b97d1928375f02175e28dcc24fc293fdfa0f44fa3b5a114914c378fce54af54bd96802063470b10ede717715547488c9695e8e33990a51043b375643e

  • SSDEEP

    196608:mHhByurErvI9pWjg/Qc+4o673pNrabewyzWGPMYnN9s:KyurEUWjZZ4dDLIeTzWGPTNC

Malware Config

Targets

    • Target

      BootstrapperV1.16.exe

    • Size

      7.5MB

    • MD5

      d07874e5e697293369d47f6727787711

    • SHA1

      50b44591caf4de65d9abf7b6c9b4e1b3ffab549e

    • SHA256

      3b5869397c4daaf4badca0590254e90e09d3e25373524d2952ae815432b35338

    • SHA512

      2aff151b97d1928375f02175e28dcc24fc293fdfa0f44fa3b5a114914c378fce54af54bd96802063470b10ede717715547488c9695e8e33990a51043b375643e

    • SSDEEP

      196608:mHhByurErvI9pWjg/Qc+4o673pNrabewyzWGPMYnN9s:KyurEUWjZZ4dDLIeTzWGPTNC

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks