Resubmissions

29-10-2024 01:10

241029-bjpxrszjdy 10

General

  • Target

    Bootstrapper.exe

  • Size

    81.5MB

  • Sample

    241029-bjpxrszjdy

  • MD5

    d143ee1bc9c11d2f18b04ef798e3fb37

  • SHA1

    57edbd903298d87fc9ca7bb14128e0964b308371

  • SHA256

    ad0e69388e00b62b044cfe1db7d9bfd8bbcff1affc60a3fdfa0255451e8e34a9

  • SHA512

    4cfdf3a2fe2ffdbba760e53646e82153890906717e503ec17bac6bf228b0243671f79985f2611f7b982ab541a749265f64535f470011bac6fab00ac247973e10

  • SSDEEP

    1572864:2XUZQglX8DWa7v5Sk8IpG7V+VPhqO+6YE7Olg0iYgj+h58sMwLIX9vqucJXt:2XUZ5Rc/1SkB05awO+6Qe+53q9v6t

Malware Config

Targets

    • Target

      Bootstrapper.exe

    • Size

      81.5MB

    • MD5

      d143ee1bc9c11d2f18b04ef798e3fb37

    • SHA1

      57edbd903298d87fc9ca7bb14128e0964b308371

    • SHA256

      ad0e69388e00b62b044cfe1db7d9bfd8bbcff1affc60a3fdfa0255451e8e34a9

    • SHA512

      4cfdf3a2fe2ffdbba760e53646e82153890906717e503ec17bac6bf228b0243671f79985f2611f7b982ab541a749265f64535f470011bac6fab00ac247973e10

    • SSDEEP

      1572864:2XUZQglX8DWa7v5Sk8IpG7V+VPhqO+6YE7Olg0iYgj+h58sMwLIX9vqucJXt:2XUZ5Rc/1SkB05awO+6Qe+53q9v6t

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks