General
-
Target
Bootstrapper1.55.exe
-
Size
76.4MB
-
Sample
241225-q5yjcsvjcw
-
MD5
2c8781fb8af16e9646c0fc2ce303a699
-
SHA1
1444b640655d1e5494ca486d0333cff86aa1e3d6
-
SHA256
f110a7d8c7f741474e6b6cfdb33aba02a2de58280dbd92f7c118a780d9eabceb
-
SHA512
ad34362c042ecb00a5804c1dab0b55627726596d38ae09ab1d84c6321b6028f2f52c284943bbd2903549586d07221be44a4123bbb2c7890b1bc985baf13e5f2d
-
SSDEEP
1572864:v8VlOWyomcSk8IpG7V+VPhqSvE7WxylKN0iY4MHHLeqPNLtD5zq3BxZpW9ryN:vKYromcSkB05awStxyMZMHVLt1zq3juE
Behavioral task
behavioral1
Sample
Bootstrapper1.55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bootstrapper1.55.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Bootstrapper1.55.exe
-
Size
76.4MB
-
MD5
2c8781fb8af16e9646c0fc2ce303a699
-
SHA1
1444b640655d1e5494ca486d0333cff86aa1e3d6
-
SHA256
f110a7d8c7f741474e6b6cfdb33aba02a2de58280dbd92f7c118a780d9eabceb
-
SHA512
ad34362c042ecb00a5804c1dab0b55627726596d38ae09ab1d84c6321b6028f2f52c284943bbd2903549586d07221be44a4123bbb2c7890b1bc985baf13e5f2d
-
SSDEEP
1572864:v8VlOWyomcSk8IpG7V+VPhqSvE7WxylKN0iY4MHHLeqPNLtD5zq3BxZpW9ryN:vKYromcSkB05awStxyMZMHVLt1zq3juE
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-