General

  • Target

    eda9fd3f077c8a8841cc1ea244271d4f4d71d97181486361943540c6876f1f0c

  • Size

    78KB

  • Sample

    220326-zfqa5ahca4

  • MD5

    f1ca4613ecaf3b075cd4357124ea13f9

  • SHA1

    4075af3be4a39a6efd446e3bd959e77b511056bc

  • SHA256

    eda9fd3f077c8a8841cc1ea244271d4f4d71d97181486361943540c6876f1f0c

  • SHA512

    3689e5cceedd615ea3f42c11fd91a23ad9867858ae5e91e6937260dbadf599ebc47758339aedde9eb69bc3a31b2a90de62ff97023ab81fe23327b84e548c5ac6

Malware Config

Targets

    • Target

      eda9fd3f077c8a8841cc1ea244271d4f4d71d97181486361943540c6876f1f0c

    • Size

      78KB

    • MD5

      f1ca4613ecaf3b075cd4357124ea13f9

    • SHA1

      4075af3be4a39a6efd446e3bd959e77b511056bc

    • SHA256

      eda9fd3f077c8a8841cc1ea244271d4f4d71d97181486361943540c6876f1f0c

    • SHA512

      3689e5cceedd615ea3f42c11fd91a23ad9867858ae5e91e6937260dbadf599ebc47758339aedde9eb69bc3a31b2a90de62ff97023ab81fe23327b84e548c5ac6

    • MetamorpherRAT

      Metamorpherrat is a hacking tool that has been around for a while since 2013.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks