General

  • Target

    Bootstrapper.exe

  • Size

    9.9MB

  • Sample

    250105-3lzzas1nap

  • MD5

    356719a726715fd6bb5de4a5a4ab4cb1

  • SHA1

    185a61cef6c264c4a55c2baf444929f3b8f80e34

  • SHA256

    414f73d079d5ca28d21a946fabbe458f9a044f77e4ed826dd610511cfe8117b5

  • SHA512

    412ec5ead037fffcb97a07f3569464e9f0f741c77244ba251dcf83d3e931a9babb91aaf6105a39870c00a5443dc0d789be81f7cc0af38d9336fa8c70f1b48dc1

  • SSDEEP

    196608:BmhhOV5TYFc0X8IxY0W7yZS+urErvI9pWjg/Qc+4o673pNrabeSyzWtPMYnNcsE:o84vY0WuVurEUWjZZ4dDLIehzWtPTNzE

Malware Config

Targets

    • Target

      Bootstrapper.exe

    • Size

      9.9MB

    • MD5

      356719a726715fd6bb5de4a5a4ab4cb1

    • SHA1

      185a61cef6c264c4a55c2baf444929f3b8f80e34

    • SHA256

      414f73d079d5ca28d21a946fabbe458f9a044f77e4ed826dd610511cfe8117b5

    • SHA512

      412ec5ead037fffcb97a07f3569464e9f0f741c77244ba251dcf83d3e931a9babb91aaf6105a39870c00a5443dc0d789be81f7cc0af38d9336fa8c70f1b48dc1

    • SSDEEP

      196608:BmhhOV5TYFc0X8IxY0W7yZS+urErvI9pWjg/Qc+4o673pNrabeSyzWtPMYnNcsE:o84vY0WuVurEUWjZZ4dDLIehzWtPTNzE

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks