General

  • Target

    Boostrapper.exe

  • Size

    103.0MB

  • Sample

    250107-hy7jpazmev

  • MD5

    6f33bedd125bc6ad6e88248129e0fc11

  • SHA1

    b3586fc9d03717307d92527f71ecdf706a96de05

  • SHA256

    10bcf998d8b57e71eafc5d946eedf7a359c8a7fead89efc3ffc54d491d7d7728

  • SHA512

    263b690ae2101724fa63e38fccb801d42fe167866618419a42e47fc5e60d8ee656b58e59bd8299142fea3efac09361baf91ac119fca28f91aeb8207fd0e8679c

  • SSDEEP

    3145728:33nzTCRrS6xjKcBanL2qHO5iVXfnGQbRe0zJcB3Z2:HzOZSWNaBHCid1XcBE

Malware Config

Targets

    • Target

      Boostrapper.exe

    • Size

      103.0MB

    • MD5

      6f33bedd125bc6ad6e88248129e0fc11

    • SHA1

      b3586fc9d03717307d92527f71ecdf706a96de05

    • SHA256

      10bcf998d8b57e71eafc5d946eedf7a359c8a7fead89efc3ffc54d491d7d7728

    • SHA512

      263b690ae2101724fa63e38fccb801d42fe167866618419a42e47fc5e60d8ee656b58e59bd8299142fea3efac09361baf91ac119fca28f91aeb8207fd0e8679c

    • SSDEEP

      3145728:33nzTCRrS6xjKcBanL2qHO5iVXfnGQbRe0zJcB3Z2:HzOZSWNaBHCid1XcBE

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks