General
-
Target
Doc-Print.exe
-
Size
368KB
-
Sample
200714-p21eh6tdy2
-
MD5
fcc9314bc996fa04721aa469e1d982df
-
SHA1
c306f42bd091c86328651e30c15ac49a7ebb02c4
-
SHA256
e4817740d78a5543811272a0b6de0a226594c84b2801926b53ced825f68bd529
-
SHA512
fac82d815108b111b3a63063e757c2d5ed367e3a94dbe3dc3af252f8c1968aead07df32405f3f16012b13b203f264d764666b49ac192daa98334a3c3be32c0f3
Static task
static1
Behavioral task
behavioral1
Sample
Doc-Print.exe
Resource
win7
Malware Config
Extracted
buer
https://162.244.81.87/
http://162.244.81.87:8080/
Extracted
metasploit
windows/download_exec
http://31.14.40.55:80/YRDm
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; qdesk 2.4.1263.203; Windows NT 6.1; WOW64; Trident/5.0)
Targets
-
-
Target
Doc-Print.exe
-
Size
368KB
-
MD5
fcc9314bc996fa04721aa469e1d982df
-
SHA1
c306f42bd091c86328651e30c15ac49a7ebb02c4
-
SHA256
e4817740d78a5543811272a0b6de0a226594c84b2801926b53ced825f68bd529
-
SHA512
fac82d815108b111b3a63063e757c2d5ed367e3a94dbe3dc3af252f8c1968aead07df32405f3f16012b13b203f264d764666b49ac192daa98334a3c3be32c0f3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies WinLogon for persistence
-
Buer Loader
Detects Buer loader in memory or disk.
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-