General

  • Target

    Bootstrapper.exe

  • Size

    8.3MB

  • Sample

    241022-wdr56azalm

  • MD5

    b5738271770b32d4b1316ea89b058051

  • SHA1

    82d64b360e2464c93d540b20413321f9eb94eb91

  • SHA256

    4b79a2461f1cb70506c166a922e7b1a64e7140d48d9d3bfae840b712e11238a8

  • SHA512

    04492f469b8bf045fa289420a12863457dddcebda9351aece654cce554042b04c31aac47cee5b1d8d9a6dba01d6f68cbf8e1e3aa11012fd153055b90cfe911e4

  • SSDEEP

    196608:ZG+sxf2urErvI9pWjgU1DEzx7sKL/s1tySEyAkjUWlRHe59:oXxf2urEUWjhEhn01tvN9Y9

Malware Config

Targets

    • Target

      Bootstrapper.exe

    • Size

      8.3MB

    • MD5

      b5738271770b32d4b1316ea89b058051

    • SHA1

      82d64b360e2464c93d540b20413321f9eb94eb91

    • SHA256

      4b79a2461f1cb70506c166a922e7b1a64e7140d48d9d3bfae840b712e11238a8

    • SHA512

      04492f469b8bf045fa289420a12863457dddcebda9351aece654cce554042b04c31aac47cee5b1d8d9a6dba01d6f68cbf8e1e3aa11012fd153055b90cfe911e4

    • SSDEEP

      196608:ZG+sxf2urErvI9pWjgU1DEzx7sKL/s1tySEyAkjUWlRHe59:oXxf2urEUWjhEhn01tvN9Y9

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks