General
-
Target
ApexBoostrapper.exe
-
Size
6.7MB
-
Sample
250126-ytcfratjbm
-
MD5
fcdf1225d28eb9ecc03dec5e3c6f66c7
-
SHA1
afa5e40457157f6c2377762605d25191bd5f7dea
-
SHA256
81ec43ecfbc9c54f60c6e995744406ad4e4b381d7b0f51a3238fa423975e6fbd
-
SHA512
0e89282a7189fc43f00b22ea0eebb9530b355ff887b25cf41b347f3cbc531ac5ee5f98a576673d97ba90dca1fc2e769c1f3bcc6207417a2ffb22d1fa7a0ff727
-
SSDEEP
196608:rgFeeN/FJMIDJf0gsAGK5SEQRakfblKap:w/Fqyf0gsfNakzcW
Behavioral task
behavioral1
Sample
ApexBoostrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ApexBoostrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ApexBoostrapper.exe
-
Size
6.7MB
-
MD5
fcdf1225d28eb9ecc03dec5e3c6f66c7
-
SHA1
afa5e40457157f6c2377762605d25191bd5f7dea
-
SHA256
81ec43ecfbc9c54f60c6e995744406ad4e4b381d7b0f51a3238fa423975e6fbd
-
SHA512
0e89282a7189fc43f00b22ea0eebb9530b355ff887b25cf41b347f3cbc531ac5ee5f98a576673d97ba90dca1fc2e769c1f3bcc6207417a2ffb22d1fa7a0ff727
-
SSDEEP
196608:rgFeeN/FJMIDJf0gsAGK5SEQRakfblKap:w/Fqyf0gsfNakzcW
Score8/10-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-