General

  • Target

    invoice-02-01-2022-1.xls

  • Size

    24KB

  • Sample

    220512-wf31fafbe9

  • MD5

    1707c2be2eacf003e518c52123c121e1

  • SHA1

    b83762f18620a60856c92ee84b83d60590c4bc8f

  • SHA256

    98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc

  • SHA512

    dfaf2439b36e5893eb65a0e8a5408224359fb8abbd1d868c1dd987a6bb0035e9fa53b0442a2cfb70b66bbfdb99820caacb43378b14e86e4fb2b7c5ceadc9f739

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://shinyobjects.birds:80/metal.exe

Targets

    • Target

      invoice-02-01-2022-1.xls

    • Size

      24KB

    • MD5

      1707c2be2eacf003e518c52123c121e1

    • SHA1

      b83762f18620a60856c92ee84b83d60590c4bc8f

    • SHA256

      98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc

    • SHA512

      dfaf2439b36e5893eb65a0e8a5408224359fb8abbd1d868c1dd987a6bb0035e9fa53b0442a2cfb70b66bbfdb99820caacb43378b14e86e4fb2b7c5ceadc9f739

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks