General

  • Target

    Bootstrapper_v2,19.exe

  • Size

    7.6MB

  • Sample

    250201-vmz2patncl

  • MD5

    819aa6ba2c52586bdcff52d803c4b110

  • SHA1

    a4a09af46fc3a9a7593773b19b20e565bc3de852

  • SHA256

    cdd65b5a1f4f1fa98a3c63d5e89b08aa4159598ac2d977e5b049ef14cab20147

  • SHA512

    65ebd06e5ce78b753d1edfee08222ab16d2f5ccd91f38389fffb5b2c3a3ace583a61abd4c4a8b5054440f1361f09203b2317fe217617bc3720f3e95f05529f88

  • SSDEEP

    196608:O1D+kdTwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWD:a5OIHL7HmBYXrYoaUN8

Malware Config

Targets

    • Target

      Bootstrapper_v2,19.exe

    • Size

      7.6MB

    • MD5

      819aa6ba2c52586bdcff52d803c4b110

    • SHA1

      a4a09af46fc3a9a7593773b19b20e565bc3de852

    • SHA256

      cdd65b5a1f4f1fa98a3c63d5e89b08aa4159598ac2d977e5b049ef14cab20147

    • SHA512

      65ebd06e5ce78b753d1edfee08222ab16d2f5ccd91f38389fffb5b2c3a3ace583a61abd4c4a8b5054440f1361f09203b2317fe217617bc3720f3e95f05529f88

    • SSDEEP

      196608:O1D+kdTwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWD:a5OIHL7HmBYXrYoaUN8

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks