General
-
Target
Bootstrapper.exe
-
Size
104KB
-
Sample
240902-rm4hbsscjm
-
MD5
7776882352548456cfc6f9827572d724
-
SHA1
22785b7dac19933527255ef7a96fb331f7a455a5
-
SHA256
6a850e209de722ad4f57dd68f8af405d62ad6557772717bbd86052d1fe43910f
-
SHA512
9d0cdc083f75bf524484c231a69e5179bdcc6a6b4ab845ede88aa9ef0f336b0d3d67e90752c545272958f82d8f4fdd1293bd070bd56a3cadaa252d2b53e864e2
-
SSDEEP
3072:CugCCyYwC+M2FE6CyYwC+M2FEa80IZOAr:CtChY7X2K6hY7X2Kah
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Bootstrapper.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Bootstrapper.exe
-
Size
104KB
-
MD5
7776882352548456cfc6f9827572d724
-
SHA1
22785b7dac19933527255ef7a96fb331f7a455a5
-
SHA256
6a850e209de722ad4f57dd68f8af405d62ad6557772717bbd86052d1fe43910f
-
SHA512
9d0cdc083f75bf524484c231a69e5179bdcc6a6b4ab845ede88aa9ef0f336b0d3d67e90752c545272958f82d8f4fdd1293bd070bd56a3cadaa252d2b53e864e2
-
SSDEEP
3072:CugCCyYwC+M2FE6CyYwC+M2FEa80IZOAr:CtChY7X2K6hY7X2Kah
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in System32 directory
-