General

  • Target

    ce9af7ff6c297c44e8817eab39f6cfc3bafbc575adc21d2a2e7487b74e43f9f3

  • Size

    1.9MB

  • Sample

    201106-t3s3a85q86

  • MD5

    f6d0b41dc86d3796e151f8dba631a5a7

  • SHA1

    9ad8a54f209a92d3f97e13bfff435cf2c69dced9

  • SHA256

    ce9af7ff6c297c44e8817eab39f6cfc3bafbc575adc21d2a2e7487b74e43f9f3

  • SHA512

    b1f2781058d06a845d47836fe5826dff7ee81c8e7511ff8f3e7455dd2257c02edd8b56737afc1ec8c10d46671c87b992520b9a28669689395142d65ea44c94e9

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    31.44.184.108
  • Port:
    21
  • Username:
    alex
  • Password:
    easypassword

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://31.44.184.48:80/tv99

Attributes
  • headers User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.4; InfoPath.2)

Targets

    • Target

      ce9af7ff6c297c44e8817eab39f6cfc3bafbc575adc21d2a2e7487b74e43f9f3

    • Size

      1.9MB

    • MD5

      f6d0b41dc86d3796e151f8dba631a5a7

    • SHA1

      9ad8a54f209a92d3f97e13bfff435cf2c69dced9

    • SHA256

      ce9af7ff6c297c44e8817eab39f6cfc3bafbc575adc21d2a2e7487b74e43f9f3

    • SHA512

      b1f2781058d06a845d47836fe5826dff7ee81c8e7511ff8f3e7455dd2257c02edd8b56737afc1ec8c10d46671c87b992520b9a28669689395142d65ea44c94e9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Executes dropped EXE

    • Stops running service(s)

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • JavaScript code in executable

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Winlogon Helper DLL

1
T1004

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

3
T1089

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks