General
-
Target
Boostrapper.exe
-
Size
94KB
-
Sample
241125-naa4gazpgq
-
MD5
a0faa8efdcb841126cc98047b0c4c659
-
SHA1
4ef17c24f4cb9d42a4314afa466cb9a216465e30
-
SHA256
979117f43af943864839dd1709da2d8e78390a052ba404b17c35500a65d06eae
-
SHA512
f50dd4135929923c6b6d86ea9a0b6a44b7954dccfe270c8d4b2f9b820a793927e4e623c29e499f5e7bb9dcb6f5c183ba22ac1de018a76b07498857c7c4a5453d
-
SSDEEP
1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfGwMYHhZOU:v7DhdC6kzWypvaQ0FxyNTBfGSHr
Static task
static1
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Boostrapper.exe
-
Size
94KB
-
MD5
a0faa8efdcb841126cc98047b0c4c659
-
SHA1
4ef17c24f4cb9d42a4314afa466cb9a216465e30
-
SHA256
979117f43af943864839dd1709da2d8e78390a052ba404b17c35500a65d06eae
-
SHA512
f50dd4135929923c6b6d86ea9a0b6a44b7954dccfe270c8d4b2f9b820a793927e4e623c29e499f5e7bb9dcb6f5c183ba22ac1de018a76b07498857c7c4a5453d
-
SSDEEP
1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfGwMYHhZOU:v7DhdC6kzWypvaQ0FxyNTBfGSHr
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
3Hidden Files and Directories
2Ignore Process Interrupts
1Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1