General
-
Target
bootstrapper.exe
-
Size
7.7MB
-
Sample
241102-b2l9lawkh1
-
MD5
eb7528a5f0b74170e26a4a04301be90c
-
SHA1
d7e634a5c4c5757c2e1422ac8e5a64dca4f683a0
-
SHA256
9cbc1406385b0859e9409aaa4b7c42a7456fcf6880d99345907392fbe4c102f6
-
SHA512
57c6915d116c7ad12f746648da7a04dc2adc18776480d5d10934ded89d2f63f1845ed05731ba277dec8949faa12d451f4789a213086fc4b816e59769c5281dda
-
SSDEEP
196608:GN0bWheNTfm/pf+xk4dNSESRpmrbW3jmrX:6iy/pWu4m5RpmrbmyrX
Behavioral task
behavioral1
Sample
bootstrapper.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
bootstrapper.exe
-
Size
7.7MB
-
MD5
eb7528a5f0b74170e26a4a04301be90c
-
SHA1
d7e634a5c4c5757c2e1422ac8e5a64dca4f683a0
-
SHA256
9cbc1406385b0859e9409aaa4b7c42a7456fcf6880d99345907392fbe4c102f6
-
SHA512
57c6915d116c7ad12f746648da7a04dc2adc18776480d5d10934ded89d2f63f1845ed05731ba277dec8949faa12d451f4789a213086fc4b816e59769c5281dda
-
SSDEEP
196608:GN0bWheNTfm/pf+xk4dNSESRpmrbW3jmrX:6iy/pWu4m5RpmrbmyrX
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-