General

  • Target

    Bootstrapper.zip

  • Size

    4.7MB

  • Sample

    241025-h8zltswgkd

  • MD5

    e8fba5aaf0254be07a34023bc82c2d9e

  • SHA1

    8040580ea75790184d53b767fb18af998082bccb

  • SHA256

    d3248730e06594bdb4e514e3147a0ccff7c119b926ced3d88d96dc2189850900

  • SHA512

    f0fdb2317c0806d420dff29346044065ff7639d35ecdf232d573475bf2966c6cc3de1c227317f5dd740041bb320e5632f7a2ba28b1bc605d4c9e41a6c791a5a9

  • SSDEEP

    98304:1Jzrklg/97TkR3PjTSG68ycuGwZlt/Gyq+g9Xw:1JPky/y5TC8puGwZlkkEXw

Malware Config

Targets

    • Target

      Bootstrapper.zip

    • Size

      4.7MB

    • MD5

      e8fba5aaf0254be07a34023bc82c2d9e

    • SHA1

      8040580ea75790184d53b767fb18af998082bccb

    • SHA256

      d3248730e06594bdb4e514e3147a0ccff7c119b926ced3d88d96dc2189850900

    • SHA512

      f0fdb2317c0806d420dff29346044065ff7639d35ecdf232d573475bf2966c6cc3de1c227317f5dd740041bb320e5632f7a2ba28b1bc605d4c9e41a6c791a5a9

    • SSDEEP

      98304:1Jzrklg/97TkR3PjTSG68ycuGwZlt/Gyq+g9Xw:1JPky/y5TC8puGwZlkkEXw

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Bootstrapper.exe

    • Size

      5.8MB

    • MD5

      40dd4390417dec8dfff3039705d9a9d0

    • SHA1

      fcf8e0710802eb51cadc52f268cb1b429ea5a33e

    • SHA256

      55214af6a7d5ba907e941186e5c192f128b02f9cc3ef08e5dd712bee7729f4b1

    • SHA512

      ae3c312032a6a7e240bbefb48c5b313025be6aef103c820e33129216e8b5f33d35a3d7690a48b881484d7aa6471b228ee370c130f779d2541f83182ad9ef29ab

    • SSDEEP

      98304:mUFUx6LEiNaUKF1CWmKLBGSRt7JqwVnExMQDVymhRL/0DSJAOEOWMX8gT:mWUx6LDNdy/voMnEeQRymh+8MORl

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks