General

  • Target

    Boostrapper.exe

  • Size

    27.6MB

  • Sample

    240907-rv7jys1ajc

  • MD5

    6c25b6fd62d8fb2fb6f29ca37e246978

  • SHA1

    3206dd46ecc162f296c4062ed195b2afdc8c653c

  • SHA256

    7a51b2f4ddb009b57a1483e55d7959a77a1baff35f2f14b1cf3abdd283a8c286

  • SHA512

    067e4111ca03d40367d8876fa346cc174fcb78010f41215b6bf53bc37e288a7094d3ceb5cfc16acdbf1bb8b621b3d3f396bf07aecd5eb153e9d8fb4c05966a56

  • SSDEEP

    786432:07vDACrv3FqbqTOhQiXgPQEErUlqsAI6eQR:07v0eqbgaQE89EdI6eQR

Malware Config

Targets

    • Target

      Boostrapper.exe

    • Size

      27.6MB

    • MD5

      6c25b6fd62d8fb2fb6f29ca37e246978

    • SHA1

      3206dd46ecc162f296c4062ed195b2afdc8c653c

    • SHA256

      7a51b2f4ddb009b57a1483e55d7959a77a1baff35f2f14b1cf3abdd283a8c286

    • SHA512

      067e4111ca03d40367d8876fa346cc174fcb78010f41215b6bf53bc37e288a7094d3ceb5cfc16acdbf1bb8b621b3d3f396bf07aecd5eb153e9d8fb4c05966a56

    • SSDEEP

      786432:07vDACrv3FqbqTOhQiXgPQEErUlqsAI6eQR:07v0eqbgaQE89EdI6eQR

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks