General

  • Target

    ApexBoostrapper.exe

  • Size

    6.7MB

  • Sample

    250126-ytcfratjbm

  • MD5

    fcdf1225d28eb9ecc03dec5e3c6f66c7

  • SHA1

    afa5e40457157f6c2377762605d25191bd5f7dea

  • SHA256

    81ec43ecfbc9c54f60c6e995744406ad4e4b381d7b0f51a3238fa423975e6fbd

  • SHA512

    0e89282a7189fc43f00b22ea0eebb9530b355ff887b25cf41b347f3cbc531ac5ee5f98a576673d97ba90dca1fc2e769c1f3bcc6207417a2ffb22d1fa7a0ff727

  • SSDEEP

    196608:rgFeeN/FJMIDJf0gsAGK5SEQRakfblKap:w/Fqyf0gsfNakzcW

Malware Config

Targets

    • Target

      ApexBoostrapper.exe

    • Size

      6.7MB

    • MD5

      fcdf1225d28eb9ecc03dec5e3c6f66c7

    • SHA1

      afa5e40457157f6c2377762605d25191bd5f7dea

    • SHA256

      81ec43ecfbc9c54f60c6e995744406ad4e4b381d7b0f51a3238fa423975e6fbd

    • SHA512

      0e89282a7189fc43f00b22ea0eebb9530b355ff887b25cf41b347f3cbc531ac5ee5f98a576673d97ba90dca1fc2e769c1f3bcc6207417a2ffb22d1fa7a0ff727

    • SSDEEP

      196608:rgFeeN/FJMIDJf0gsAGK5SEQRakfblKap:w/Fqyf0gsfNakzcW

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks