General

  • Target

    BootstrapperV1.22.exe

  • Size

    25.8MB

  • Sample

    241031-r1lvfazhnk

  • MD5

    41e55aa25ab9d6a3c423678142dcd0dc

  • SHA1

    5d04337602d48484b6b90674949840f4f9915575

  • SHA256

    026d34969248578586de3e3f080110edd2f0b9a6818cacab23fce082af3e6ac3

  • SHA512

    e719cde59771159c50e08ff3bc2103d19e311cd870fc28bd150898bafcc4093a701d21cf9809bfa2c4e0310a79a4b9e129bd3c3adfdb7ee0af094d6159cf9045

  • SSDEEP

    393216:ZqPnLFXlrpEvQ8DOEjgskoGi2FiW8G9cebgf1NblQ6xrq9jb9LHz0UJUFv:QPLFXNaQh6T24W8IS1Ar/Nz0

Malware Config

Targets

    • Target

      BootstrapperV1.22.exe

    • Size

      25.8MB

    • MD5

      41e55aa25ab9d6a3c423678142dcd0dc

    • SHA1

      5d04337602d48484b6b90674949840f4f9915575

    • SHA256

      026d34969248578586de3e3f080110edd2f0b9a6818cacab23fce082af3e6ac3

    • SHA512

      e719cde59771159c50e08ff3bc2103d19e311cd870fc28bd150898bafcc4093a701d21cf9809bfa2c4e0310a79a4b9e129bd3c3adfdb7ee0af094d6159cf9045

    • SSDEEP

      393216:ZqPnLFXlrpEvQ8DOEjgskoGi2FiW8G9cebgf1NblQ6xrq9jb9LHz0UJUFv:QPLFXNaQh6T24W8IS1Ar/Nz0

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks