General
-
Target
BootstrapperNew.exe
-
Size
10.0MB
-
Sample
250221-chdzjsslv5
-
MD5
67e73f4417fda65b081f0fa55ac23b14
-
SHA1
ae1bdb410b97ed3212cf649af364531d7a640a1b
-
SHA256
c5792d15b0c5a001d8933ab76b92404c38f4d390540cb079b623a24de4d6abb0
-
SHA512
64f5ba113cd64cf3fa62415ebfe4360e6086c46fed5e4c975c3625bd483e3b7ae35e058841eedabb9e2a123c2b4f75adf288bea6f8c1002af72106a828f74110
-
SSDEEP
196608:WWO069YASYMYYBKpYDXcbwO/ikbwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAov:jEHOXcb1inIH20drLYRZjov
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
BootstrapperNew.exe
-
Size
10.0MB
-
MD5
67e73f4417fda65b081f0fa55ac23b14
-
SHA1
ae1bdb410b97ed3212cf649af364531d7a640a1b
-
SHA256
c5792d15b0c5a001d8933ab76b92404c38f4d390540cb079b623a24de4d6abb0
-
SHA512
64f5ba113cd64cf3fa62415ebfe4360e6086c46fed5e4c975c3625bd483e3b7ae35e058841eedabb9e2a123c2b4f75adf288bea6f8c1002af72106a828f74110
-
SSDEEP
196608:WWO069YASYMYYBKpYDXcbwO/ikbwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAov:jEHOXcb1inIH20drLYRZjov
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-