General
-
Target
Boostrapper.exe
-
Size
28.6MB
-
Sample
241008-rqch1svapc
-
MD5
dce9cff74b9d9bab6a5986013aec628e
-
SHA1
b815990c20f978888cbf1d09a31f374423785d0b
-
SHA256
146e60d8dc75128cfd31cd96f589e53224637b76473ebb64a920a4d9da0eccc2
-
SHA512
a4cd1c4ebc9937b0f902660e067028cba11ae1a14332ea0948e74e9a270668ece765f0f1462d34ade757cc04ac634bdb171ff8b980b1a04f9bccca01a130411b
-
SSDEEP
786432:GhQiXgPQEErUlqsA3XTg5MS57vDACrv3Fqbqx:iQE89Ed3XTg5MS57v0eqbQ
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Boostrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Boostrapper.exe
-
Size
28.6MB
-
MD5
dce9cff74b9d9bab6a5986013aec628e
-
SHA1
b815990c20f978888cbf1d09a31f374423785d0b
-
SHA256
146e60d8dc75128cfd31cd96f589e53224637b76473ebb64a920a4d9da0eccc2
-
SHA512
a4cd1c4ebc9937b0f902660e067028cba11ae1a14332ea0948e74e9a270668ece765f0f1462d34ade757cc04ac634bdb171ff8b980b1a04f9bccca01a130411b
-
SSDEEP
786432:GhQiXgPQEErUlqsA3XTg5MS57vDACrv3Fqbqx:iQE89Ed3XTg5MS57v0eqbQ
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-