General
-
Target
Bootstrapper.v19.exe
-
Size
12.0MB
-
Sample
241006-aa9p5swhkm
-
MD5
624cecbd5312f45f6f9ad90e8cda5762
-
SHA1
fb141ac8f4e4a071ea97876e6225f9dd1ae8e96c
-
SHA256
58f4f387a6a5b9a3befdb5607c669e3169edef5408a81fd1dddb38596f3544ba
-
SHA512
a97a471b09aa8834ca657f5f88ce2e6bec6aae28ed8b4e5e6460582a647ba82efa6a1edc94bb80c9206bf95258cad57b21829afa7f386834759c08642821c2d2
-
SSDEEP
98304:8iSi8x9XQskurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOC1124:8lP9VkurErvI9pWjgfPvzm6gsFEg4A3
Behavioral task
behavioral1
Sample
Bootstrapper.v19.exe
Resource
win7-20240903-it
Behavioral task
behavioral2
Sample
Bootstrapper.v19.exe
Resource
win10v2004-20240802-it
Behavioral task
behavioral3
Sample
:�.pyc
Resource
win7-20240903-it
Behavioral task
behavioral4
Sample
:�.pyc
Resource
win10v2004-20240802-it
Malware Config
Targets
-
-
Target
Bootstrapper.v19.exe
-
Size
12.0MB
-
MD5
624cecbd5312f45f6f9ad90e8cda5762
-
SHA1
fb141ac8f4e4a071ea97876e6225f9dd1ae8e96c
-
SHA256
58f4f387a6a5b9a3befdb5607c669e3169edef5408a81fd1dddb38596f3544ba
-
SHA512
a97a471b09aa8834ca657f5f88ce2e6bec6aae28ed8b4e5e6460582a647ba82efa6a1edc94bb80c9206bf95258cad57b21829afa7f386834759c08642821c2d2
-
SSDEEP
98304:8iSi8x9XQskurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOC1124:8lP9VkurErvI9pWjgfPvzm6gsFEg4A3
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
:�.pyc
-
Size
1KB
-
MD5
68969eba28388fdf0912dc18eced0482
-
SHA1
3b6348b57b35edde066a21736ce62f27892e370d
-
SHA256
c0f6f05236c4e1958657260b54fa4cd8c74627dcd1a8629a08187ff49b04d93a
-
SHA512
7ce663e2870732228b26c8c8ab38ab289fe35e25ba2323a14c590844667abf6242e1bb4cf1f93bd1012a828004a12f7f3ee9b7b29dbf95c43b3a9c495e3ea876
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3