General

  • Target

    CloudyBootstrapInstaller.exe

  • Size

    47KB

  • Sample

    241121-m5tzdswlbk

  • MD5

    9e681e8a6c61f2bd6cde35842bdbe9d4

  • SHA1

    968ccfff20166db5af30011e2d31f4d2ad5c52da

  • SHA256

    f9ca892ce53cc42030042733ae4f131a9e335d342eaa895d6feaf8afd6c7acc1

  • SHA512

    b4a3ac324dec74ac665763019778444f8ce80756ef54d4f7d051b9710772cd2703853a0e434f3214bff85a4231106c2df090f07367ece0cc560bfde46011043f

  • SSDEEP

    768:rVbg7TFzZtlV6E8VlCI0nfxePeNTL1nFdh1B4WkXpuBaV8P9ki+La6JJ7tYFA+VY:rBgwflLFcT17bygg+PuNL1J4jVcl

Score
7/10

Malware Config

Targets

    • Target

      CloudyBootstrapInstaller.exe

    • Size

      47KB

    • MD5

      9e681e8a6c61f2bd6cde35842bdbe9d4

    • SHA1

      968ccfff20166db5af30011e2d31f4d2ad5c52da

    • SHA256

      f9ca892ce53cc42030042733ae4f131a9e335d342eaa895d6feaf8afd6c7acc1

    • SHA512

      b4a3ac324dec74ac665763019778444f8ce80756ef54d4f7d051b9710772cd2703853a0e434f3214bff85a4231106c2df090f07367ece0cc560bfde46011043f

    • SSDEEP

      768:rVbg7TFzZtlV6E8VlCI0nfxePeNTL1nFdh1B4WkXpuBaV8P9ki+La6JJ7tYFA+VY:rBgwflLFcT17bygg+PuNL1J4jVcl

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

MITRE ATT&CK Enterprise v15

Tasks