General

  • Target

    BootstrapperV1.18.exe

  • Size

    971KB

  • Sample

    240908-y222datbrq

  • MD5

    335c86796cb4bb70a4475ab42835320e

  • SHA1

    6307f5824e29a69dbd37a7e8c048db99e18eb88b

  • SHA256

    1e264a7ebc6f216495ecbc96b8f4047e48dfa0765d2715ba399c07d173dc858f

  • SHA512

    732b4713933c93dfa181822517653676474d2dd14b31331a86d3aa8e2c08e32dcffcce42f05daa81466f78e16f6674be19695588d822213a2197aecc1e93155a

  • SSDEEP

    12288:2AXwt3si8zBLxbkY+MnHDJ1LzD1SoGkSj16XBUtbrIPQAbYLzZ3ZP:3wtcvzBLxbkY5zwoGkSjEXOtvIP1bYx

Score
7/10

Malware Config

Targets

    • Target

      BootstrapperV1.18.exe

    • Size

      971KB

    • MD5

      335c86796cb4bb70a4475ab42835320e

    • SHA1

      6307f5824e29a69dbd37a7e8c048db99e18eb88b

    • SHA256

      1e264a7ebc6f216495ecbc96b8f4047e48dfa0765d2715ba399c07d173dc858f

    • SHA512

      732b4713933c93dfa181822517653676474d2dd14b31331a86d3aa8e2c08e32dcffcce42f05daa81466f78e16f6674be19695588d822213a2197aecc1e93155a

    • SSDEEP

      12288:2AXwt3si8zBLxbkY+MnHDJ1LzD1SoGkSj16XBUtbrIPQAbYLzZ3ZP:3wtcvzBLxbkY5zwoGkSjEXOtvIP1bYx

    Score
    7/10
    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks