General
-
Target
BootstrapperV1.22.exe
-
Size
25.8MB
-
Sample
241031-r1lvfazhnk
-
MD5
41e55aa25ab9d6a3c423678142dcd0dc
-
SHA1
5d04337602d48484b6b90674949840f4f9915575
-
SHA256
026d34969248578586de3e3f080110edd2f0b9a6818cacab23fce082af3e6ac3
-
SHA512
e719cde59771159c50e08ff3bc2103d19e311cd870fc28bd150898bafcc4093a701d21cf9809bfa2c4e0310a79a4b9e129bd3c3adfdb7ee0af094d6159cf9045
-
SSDEEP
393216:ZqPnLFXlrpEvQ8DOEjgskoGi2FiW8G9cebgf1NblQ6xrq9jb9LHz0UJUFv:QPLFXNaQh6T24W8IS1Ar/Nz0
Behavioral task
behavioral1
Sample
BootstrapperV1.22.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
BootstrapperV1.22.exe
-
Size
25.8MB
-
MD5
41e55aa25ab9d6a3c423678142dcd0dc
-
SHA1
5d04337602d48484b6b90674949840f4f9915575
-
SHA256
026d34969248578586de3e3f080110edd2f0b9a6818cacab23fce082af3e6ac3
-
SHA512
e719cde59771159c50e08ff3bc2103d19e311cd870fc28bd150898bafcc4093a701d21cf9809bfa2c4e0310a79a4b9e129bd3c3adfdb7ee0af094d6159cf9045
-
SSDEEP
393216:ZqPnLFXlrpEvQ8DOEjgskoGi2FiW8G9cebgf1NblQ6xrq9jb9LHz0UJUFv:QPLFXNaQh6T24W8IS1Ar/Nz0
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1