General
-
Target
BootstrapperNew.exe
-
Size
11.8MB
-
Sample
250410-nm2f7azvhw
-
MD5
00bf4984f80c066ce8f4ecaa93c337bb
-
SHA1
4662aa890e8a64ead9b9f5b5129fae3ca0c5b60e
-
SHA256
952ad6a684a3c4bbc00494926a933c68707b80ead10eab3f096d252d9d054e9a
-
SHA512
f716f2675fa5d506e9d220dea8555c9133af43149fdfb484eaa5f1456446aea15faae78e4dd2162a27e7bf22cee95a369a8e299117ebb1d7627a178b0909799e
-
SSDEEP
196608:WboBI6F8e90gAT7Mad+xxaCSoh3Buv+6tA56+wDHBV7NeHExxX:Wb4P4T7MTxkC1Sv+UA58DHLi
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
BootstrapperNew.exe
Resource
win11-20250313-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1324859273448128522/35NX8pTWSAG9BYKMS0plx5Cvuvs_8H5JGZj2A702Gn1FEZ64KTjaAl3gNKdJNc1eYdeY
Targets
-
-
Target
BootstrapperNew.exe
-
Size
11.8MB
-
MD5
00bf4984f80c066ce8f4ecaa93c337bb
-
SHA1
4662aa890e8a64ead9b9f5b5129fae3ca0c5b60e
-
SHA256
952ad6a684a3c4bbc00494926a933c68707b80ead10eab3f096d252d9d054e9a
-
SHA512
f716f2675fa5d506e9d220dea8555c9133af43149fdfb484eaa5f1456446aea15faae78e4dd2162a27e7bf22cee95a369a8e299117ebb1d7627a178b0909799e
-
SSDEEP
196608:WboBI6F8e90gAT7Mad+xxaCSoh3Buv+6tA56+wDHBV7NeHExxX:Wb4P4T7MTxkC1Sv+UA58DHLi
-
44Caliber family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2