General

  • Target

    Bootstrapper.rar

  • Size

    408KB

  • Sample

    241023-xbazjavaka

  • MD5

    56b7cadbb449ada737bd6a1ba95226e1

  • SHA1

    0de4501bc83a4bd049880f567ed2693cc58e9253

  • SHA256

    8cce373ea6261fc9b467b26e54a8a1170c7e718d0d55d3987dc637c4827b137f

  • SHA512

    33ce8e2388e8a08b3f944e8a076cab84f9157ef3f6f637e49cb7f591ed801a2303a617002b267e5c550076f2e357a4f3df7b6f97ada08a2a0880c4bfc5632f52

  • SSDEEP

    12288:v319qa3M3cqqHAGI70U2wKoyWXMde3aVWD:v3fq0vAGI71LKo7XMde3aVWD

Score
7/10

Malware Config

Targets

    • Target

      Bootstrapper.rar

    • Size

      408KB

    • MD5

      56b7cadbb449ada737bd6a1ba95226e1

    • SHA1

      0de4501bc83a4bd049880f567ed2693cc58e9253

    • SHA256

      8cce373ea6261fc9b467b26e54a8a1170c7e718d0d55d3987dc637c4827b137f

    • SHA512

      33ce8e2388e8a08b3f944e8a076cab84f9157ef3f6f637e49cb7f591ed801a2303a617002b267e5c550076f2e357a4f3df7b6f97ada08a2a0880c4bfc5632f52

    • SSDEEP

      12288:v319qa3M3cqqHAGI70U2wKoyWXMde3aVWD:v3fq0vAGI71LKo7XMde3aVWD

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks