Resubmissions
29-10-2024 01:10
241029-bjpxrszjdy 10General
-
Target
Bootstrapper.exe
-
Size
81.5MB
-
Sample
241029-bjpxrszjdy
-
MD5
d143ee1bc9c11d2f18b04ef798e3fb37
-
SHA1
57edbd903298d87fc9ca7bb14128e0964b308371
-
SHA256
ad0e69388e00b62b044cfe1db7d9bfd8bbcff1affc60a3fdfa0255451e8e34a9
-
SHA512
4cfdf3a2fe2ffdbba760e53646e82153890906717e503ec17bac6bf228b0243671f79985f2611f7b982ab541a749265f64535f470011bac6fab00ac247973e10
-
SSDEEP
1572864:2XUZQglX8DWa7v5Sk8IpG7V+VPhqO+6YE7Olg0iYgj+h58sMwLIX9vqucJXt:2XUZ5Rc/1SkB05awO+6Qe+53q9v6t
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Bootstrapper.exe
-
Size
81.5MB
-
MD5
d143ee1bc9c11d2f18b04ef798e3fb37
-
SHA1
57edbd903298d87fc9ca7bb14128e0964b308371
-
SHA256
ad0e69388e00b62b044cfe1db7d9bfd8bbcff1affc60a3fdfa0255451e8e34a9
-
SHA512
4cfdf3a2fe2ffdbba760e53646e82153890906717e503ec17bac6bf228b0243671f79985f2611f7b982ab541a749265f64535f470011bac6fab00ac247973e10
-
SSDEEP
1572864:2XUZQglX8DWa7v5Sk8IpG7V+VPhqO+6YE7Olg0iYgj+h58sMwLIX9vqucJXt:2XUZ5Rc/1SkB05awO+6Qe+53q9v6t
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-