General
-
Target
BootstrapperNew.exe
-
Size
5.9MB
-
Sample
250208-qhrgjawrb1
-
MD5
7f1275dc6e829a3d73375df2850c13b5
-
SHA1
9d1c1720ea2d410113156f54eb682e31b243af57
-
SHA256
73f423af85cc19f7d4a2d8f9b74a5c6b7bea0c44e53d9a2ce959a1cfb83e75e7
-
SHA512
9207bb89b252679faa0adf9b66f975ab8b3e412fb67576c6bc12f8c4139da9a41be84e6b38d17629a89827efb5de4193ba3837002f5df3090f8624133c446ad4
-
SSDEEP
98304:2z+WCSyhi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFM9hGkrW+cdK:2CmyDDOYjJlpZstQoS9Hf12VKX7bGCWK
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
BootstrapperNew.exe
-
Size
5.9MB
-
MD5
7f1275dc6e829a3d73375df2850c13b5
-
SHA1
9d1c1720ea2d410113156f54eb682e31b243af57
-
SHA256
73f423af85cc19f7d4a2d8f9b74a5c6b7bea0c44e53d9a2ce959a1cfb83e75e7
-
SHA512
9207bb89b252679faa0adf9b66f975ab8b3e412fb67576c6bc12f8c4139da9a41be84e6b38d17629a89827efb5de4193ba3837002f5df3090f8624133c446ad4
-
SSDEEP
98304:2z+WCSyhi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFM9hGkrW+cdK:2CmyDDOYjJlpZstQoS9Hf12VKX7bGCWK
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-