General

  • Target

    Bootstrapper1.exe

  • Size

    6.9MB

  • Sample

    241002-yztl8avaqk

  • MD5

    489db93d2d3f4af5ee6bc424f52b93ce

  • SHA1

    db323a256d5e260fc840385be4dfe54bc71736a6

  • SHA256

    e1fb27aa8bad2217ea2b30ed36ea15b6b9697748f4fbf8b9dd97a40aa68a5482

  • SHA512

    0a5122917d7e6f1a1f7590f4f7f075b0796e7b1d6748ab9b28c33521fb595feabf493627a68e6364b826686d388a714bec392f3030525838228e98a8cccbbc97

  • SSDEEP

    98304:P3DjWM8JEE1rXamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFW2:P30qeNTfm/pf+xk4dWRptrbWOjgrk

Malware Config

Targets

    • Target

      Bootstrapper1.exe

    • Size

      6.9MB

    • MD5

      489db93d2d3f4af5ee6bc424f52b93ce

    • SHA1

      db323a256d5e260fc840385be4dfe54bc71736a6

    • SHA256

      e1fb27aa8bad2217ea2b30ed36ea15b6b9697748f4fbf8b9dd97a40aa68a5482

    • SHA512

      0a5122917d7e6f1a1f7590f4f7f075b0796e7b1d6748ab9b28c33521fb595feabf493627a68e6364b826686d388a714bec392f3030525838228e98a8cccbbc97

    • SSDEEP

      98304:P3DjWM8JEE1rXamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFW2:P30qeNTfm/pf+xk4dWRptrbWOjgrk

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks