General
-
Target
BootstrapperV1.19.exe
-
Size
17.9MB
-
Sample
241004-qsaxjawgjj
-
MD5
3a0a740bdc44b166eb0524c575e244dc
-
SHA1
bfe34e6c3efc779982753a8ae806f78916e79f94
-
SHA256
727e091859971d88195bae73224b52bd2060648ab8ebbafa0ab6ae7a85f8abf6
-
SHA512
c4963c3be5c1fcd971e73f4bdc941e7672ab3973b37fdc06229654e8c6bde143cff13a719abeb8dff9b0a55489de48fcc4eb28faa5b1e47c334c649244cdfac0
-
SSDEEP
393216:fqPnLFXlrGBQ+DOETgsvfG90gQDi5vEnERBTdrq:yPLFXNGBQ/EHZDF8Bc
Behavioral task
behavioral1
Sample
BootstrapperV1.19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BootstrapperV1.19.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
BootstrapperV1.19.exe
-
Size
17.9MB
-
MD5
3a0a740bdc44b166eb0524c575e244dc
-
SHA1
bfe34e6c3efc779982753a8ae806f78916e79f94
-
SHA256
727e091859971d88195bae73224b52bd2060648ab8ebbafa0ab6ae7a85f8abf6
-
SHA512
c4963c3be5c1fcd971e73f4bdc941e7672ab3973b37fdc06229654e8c6bde143cff13a719abeb8dff9b0a55489de48fcc4eb28faa5b1e47c334c649244cdfac0
-
SSDEEP
393216:fqPnLFXlrGBQ+DOETgsvfG90gQDi5vEnERBTdrq:yPLFXNGBQ/EHZDF8Bc
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1