General

  • Target

    Bootstrapper.exe

  • Size

    9.4MB

  • Sample

    241121-w2kqzsyphk

  • MD5

    f2a6133b7f38fc49f792ae799d1b4750

  • SHA1

    6bef46ddde325f45a0e9ff123112c96bbd47c795

  • SHA256

    37bde6655e1272e159b9c2e3a7eee3f4e9a837c0f04240645d3991d112287f8d

  • SHA512

    f9611bed83b4bce1841868880a42dacb6b8f7e8859be1d85b3c8d3a365a0244566cbfb12294c7b2c82b15d6c0e47095d8246a95d522c3a064a0d8511b2411254

  • SSDEEP

    98304:UHuETr54/xXEPmZM8l2EKSxOyFOiC0YYWtS7tkk6Q9SFxVLUeRF:2pIxXoSTlzdFfCtlIZ/9iZX

Malware Config

Targets

    • Target

      Bootstrapper.exe

    • Size

      9.4MB

    • MD5

      f2a6133b7f38fc49f792ae799d1b4750

    • SHA1

      6bef46ddde325f45a0e9ff123112c96bbd47c795

    • SHA256

      37bde6655e1272e159b9c2e3a7eee3f4e9a837c0f04240645d3991d112287f8d

    • SHA512

      f9611bed83b4bce1841868880a42dacb6b8f7e8859be1d85b3c8d3a365a0244566cbfb12294c7b2c82b15d6c0e47095d8246a95d522c3a064a0d8511b2411254

    • SSDEEP

      98304:UHuETr54/xXEPmZM8l2EKSxOyFOiC0YYWtS7tkk6Q9SFxVLUeRF:2pIxXoSTlzdFfCtlIZ/9iZX

    • Event Triggered Execution: Image File Execution Options Injection

    • Deletes itself

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks