General
-
Target
BootstrapperNew.exe
-
Size
10.1MB
-
Sample
250221-cyabassp18
-
MD5
e8e9f56bb9a1d19eb8ef80a0b9040a11
-
SHA1
6d086704a5e587ab97515e9169534e4ca79d4e74
-
SHA256
ab743530671df111503d7a56b7f758685e5ac554bbefb5a42c22e8a434c64bf7
-
SHA512
4e0933e798c7965ab2f0a25c4133035827404b284b2047beaff88a5243b3095cbedd5e28bee8af2bab8bd602ed8c394c9e6c1a4b3874a5688325ccf394d5da1d
-
SSDEEP
196608:TWl06FT+LYQYMYYBKpYDXcbwO/ikbwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAe:wTQfEHOXcb1inIH20drLYRZjor
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
BootstrapperNew.exe
-
Size
10.1MB
-
MD5
e8e9f56bb9a1d19eb8ef80a0b9040a11
-
SHA1
6d086704a5e587ab97515e9169534e4ca79d4e74
-
SHA256
ab743530671df111503d7a56b7f758685e5ac554bbefb5a42c22e8a434c64bf7
-
SHA512
4e0933e798c7965ab2f0a25c4133035827404b284b2047beaff88a5243b3095cbedd5e28bee8af2bab8bd602ed8c394c9e6c1a4b3874a5688325ccf394d5da1d
-
SSDEEP
196608:TWl06FT+LYQYMYYBKpYDXcbwO/ikbwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAe:wTQfEHOXcb1inIH20drLYRZjor
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3