General

  • Target

    bootstrapper.exe

  • Size

    7.7MB

  • Sample

    241102-b2l9lawkh1

  • MD5

    eb7528a5f0b74170e26a4a04301be90c

  • SHA1

    d7e634a5c4c5757c2e1422ac8e5a64dca4f683a0

  • SHA256

    9cbc1406385b0859e9409aaa4b7c42a7456fcf6880d99345907392fbe4c102f6

  • SHA512

    57c6915d116c7ad12f746648da7a04dc2adc18776480d5d10934ded89d2f63f1845ed05731ba277dec8949faa12d451f4789a213086fc4b816e59769c5281dda

  • SSDEEP

    196608:GN0bWheNTfm/pf+xk4dNSESRpmrbW3jmrX:6iy/pWu4m5RpmrbmyrX

Malware Config

Targets

    • Target

      bootstrapper.exe

    • Size

      7.7MB

    • MD5

      eb7528a5f0b74170e26a4a04301be90c

    • SHA1

      d7e634a5c4c5757c2e1422ac8e5a64dca4f683a0

    • SHA256

      9cbc1406385b0859e9409aaa4b7c42a7456fcf6880d99345907392fbe4c102f6

    • SHA512

      57c6915d116c7ad12f746648da7a04dc2adc18776480d5d10934ded89d2f63f1845ed05731ba277dec8949faa12d451f4789a213086fc4b816e59769c5281dda

    • SSDEEP

      196608:GN0bWheNTfm/pf+xk4dNSESRpmrbW3jmrX:6iy/pWu4m5RpmrbmyrX

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks