General

  • Target

    af56714d4d1754000f42f1e8220d1b64

  • Size

    420KB

  • Sample

    201214-6jbef9lsz2

  • MD5

    af56714d4d1754000f42f1e8220d1b64

  • SHA1

    e920748f1ac768b0f35c02a6b121fc496412ba6d

  • SHA256

    a82c6a23644bfd7b236b737e30582f01e65632b5786fbe6b9c52191eb1eaf714

  • SHA512

    b52938dece21877a8924c25d47cdba09ff112a81d96ed046131848485246854b52477c2b6f04fbaee72cd5a3cb053b8fa1cefcd64b85d08bc6140ce80984e3c1

Malware Config

Targets

    • Target

      af56714d4d1754000f42f1e8220d1b64

    • Size

      420KB

    • MD5

      af56714d4d1754000f42f1e8220d1b64

    • SHA1

      e920748f1ac768b0f35c02a6b121fc496412ba6d

    • SHA256

      a82c6a23644bfd7b236b737e30582f01e65632b5786fbe6b9c52191eb1eaf714

    • SHA512

      b52938dece21877a8924c25d47cdba09ff112a81d96ed046131848485246854b52477c2b6f04fbaee72cd5a3cb053b8fa1cefcd64b85d08bc6140ce80984e3c1

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks