General

  • Target

    5ea491d224da4fb348665187bc1e1822df21579a4da2d8a9a4bbf1e315100424

  • Size

    78KB

  • Sample

    220516-pb2s9aaha5

  • MD5

    0012c8dcc11359afb8a439588c2eb6ee

  • SHA1

    f4dd248ae646e24eca69297256e70234753e67bc

  • SHA256

    5ea491d224da4fb348665187bc1e1822df21579a4da2d8a9a4bbf1e315100424

  • SHA512

    36c5fd46131c751448cdb622afd4b1af3a8a60488be91cf4ece2a10de8e67417fea37c36d7cd43ba244e7d2282760f53a866302c5acf81f3c698b55f9a31be6d

Malware Config

Targets

    • Target

      5ea491d224da4fb348665187bc1e1822df21579a4da2d8a9a4bbf1e315100424

    • Size

      78KB

    • MD5

      0012c8dcc11359afb8a439588c2eb6ee

    • SHA1

      f4dd248ae646e24eca69297256e70234753e67bc

    • SHA256

      5ea491d224da4fb348665187bc1e1822df21579a4da2d8a9a4bbf1e315100424

    • SHA512

      36c5fd46131c751448cdb622afd4b1af3a8a60488be91cf4ece2a10de8e67417fea37c36d7cd43ba244e7d2282760f53a866302c5acf81f3c698b55f9a31be6d

    • MetamorpherRAT

      Metamorpherrat is a hacking tool that has been around for a while since 2013.

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks