General

  • Target

    Boostrapper.exe

  • Size

    54.8MB

  • Sample

    241023-vggcds1bja

  • MD5

    15d667378883fa811647162e8b5c23c8

  • SHA1

    66c2c7a7ec2370be6afcfd054a2cf39e85dffbe5

  • SHA256

    f1998822b37c862e21ff69ca71c58f6bed5e8f583a08bdacbf12d89e9972e1a2

  • SHA512

    7ac62002ece093ad99b78c0b433a4919085d8500da1e159296df6f0509ef77aad3b3fb54cc9c7a16ac92c6feb25dd6e8a1372c0f411dd5f0e05b96ab92a6b7ff

  • SSDEEP

    1572864:cOsmUMvH4vNscAv2irf2TFbdFbRCj70jnqTlDQ:c+vHGAvpbsBxRCmaD

Malware Config

Targets

    • Target

      Boostrapper.exe

    • Size

      54.8MB

    • MD5

      15d667378883fa811647162e8b5c23c8

    • SHA1

      66c2c7a7ec2370be6afcfd054a2cf39e85dffbe5

    • SHA256

      f1998822b37c862e21ff69ca71c58f6bed5e8f583a08bdacbf12d89e9972e1a2

    • SHA512

      7ac62002ece093ad99b78c0b433a4919085d8500da1e159296df6f0509ef77aad3b3fb54cc9c7a16ac92c6feb25dd6e8a1372c0f411dd5f0e05b96ab92a6b7ff

    • SSDEEP

      1572864:cOsmUMvH4vNscAv2irf2TFbdFbRCj70jnqTlDQ:c+vHGAvpbsBxRCmaD

    • Detect discord webhook

      This file contains a discord webhook

    • blankgrabber

      Blankgrabber is an infostealer written in Python and packaged with Pyinstaller.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks