General

  • Target

    Bootstrapper.v19.exe

  • Size

    12.0MB

  • Sample

    241006-aa9p5swhkm

  • MD5

    624cecbd5312f45f6f9ad90e8cda5762

  • SHA1

    fb141ac8f4e4a071ea97876e6225f9dd1ae8e96c

  • SHA256

    58f4f387a6a5b9a3befdb5607c669e3169edef5408a81fd1dddb38596f3544ba

  • SHA512

    a97a471b09aa8834ca657f5f88ce2e6bec6aae28ed8b4e5e6460582a647ba82efa6a1edc94bb80c9206bf95258cad57b21829afa7f386834759c08642821c2d2

  • SSDEEP

    98304:8iSi8x9XQskurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOC1124:8lP9VkurErvI9pWjgfPvzm6gsFEg4A3

Malware Config

Targets

    • Target

      Bootstrapper.v19.exe

    • Size

      12.0MB

    • MD5

      624cecbd5312f45f6f9ad90e8cda5762

    • SHA1

      fb141ac8f4e4a071ea97876e6225f9dd1ae8e96c

    • SHA256

      58f4f387a6a5b9a3befdb5607c669e3169edef5408a81fd1dddb38596f3544ba

    • SHA512

      a97a471b09aa8834ca657f5f88ce2e6bec6aae28ed8b4e5e6460582a647ba82efa6a1edc94bb80c9206bf95258cad57b21829afa7f386834759c08642821c2d2

    • SSDEEP

      98304:8iSi8x9XQskurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOC1124:8lP9VkurErvI9pWjgfPvzm6gsFEg4A3

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      :�.pyc

    • Size

      1KB

    • MD5

      68969eba28388fdf0912dc18eced0482

    • SHA1

      3b6348b57b35edde066a21736ce62f27892e370d

    • SHA256

      c0f6f05236c4e1958657260b54fa4cd8c74627dcd1a8629a08187ff49b04d93a

    • SHA512

      7ce663e2870732228b26c8c8ab38ab289fe35e25ba2323a14c590844667abf6242e1bb4cf1f93bd1012a828004a12f7f3ee9b7b29dbf95c43b3a9c495e3ea876

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks