General

  • Target

    boosttool.exe

  • Size

    17.8MB

  • Sample

    241027-vcrmkaxmhx

  • MD5

    15eb3faa3bbf403431ef6fba76a31fba

  • SHA1

    93ebb4f64459b2b4fd646d9976e8381546d6267a

  • SHA256

    6ce143b78d8f6163cdebca6c3a13877efda7337c14ffe5b50faf431eb77def56

  • SHA512

    db2572ef55b247a26d2d4e92253d470009a3b23818c929b1cdde1227c511098aadb43a443dc89213163cf950d23475129a943d00dde1be9a6f9509147908713a

  • SSDEEP

    393216:gqPnLFXlr2Q+DOETgsvfGMMg38gvEusDJmDaq:hPLFXN2Q/EM+8ZxDu

Malware Config

Targets

    • Target

      boosttool.exe

    • Size

      17.8MB

    • MD5

      15eb3faa3bbf403431ef6fba76a31fba

    • SHA1

      93ebb4f64459b2b4fd646d9976e8381546d6267a

    • SHA256

      6ce143b78d8f6163cdebca6c3a13877efda7337c14ffe5b50faf431eb77def56

    • SHA512

      db2572ef55b247a26d2d4e92253d470009a3b23818c929b1cdde1227c511098aadb43a443dc89213163cf950d23475129a943d00dde1be9a6f9509147908713a

    • SSDEEP

      393216:gqPnLFXlr2Q+DOETgsvfGMMg38gvEusDJmDaq:hPLFXN2Q/EM+8ZxDu

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks