General

  • Target

    118be799dbd2f451b4b84584600de318047f1ae26e6585f146067584e344df5d

  • Size

    339KB

  • Sample

    220604-db4gasehc7

  • MD5

    7b510ac6a2a91e5ee5ede16619e4f73b

  • SHA1

    04ed62ed049e305459d2ca9626a00e909e5add07

  • SHA256

    118be799dbd2f451b4b84584600de318047f1ae26e6585f146067584e344df5d

  • SHA512

    cb33e7c884c79d593ad5e6ad9324831a39270581d41f7ec8d14eaf04a38796df20f3bcc5caf9ff750cd33588697445c3440828bb269d9e7f8947c39fbcb4105a

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      118be799dbd2f451b4b84584600de318047f1ae26e6585f146067584e344df5d

    • Size

      339KB

    • MD5

      7b510ac6a2a91e5ee5ede16619e4f73b

    • SHA1

      04ed62ed049e305459d2ca9626a00e909e5add07

    • SHA256

      118be799dbd2f451b4b84584600de318047f1ae26e6585f146067584e344df5d

    • SHA512

      cb33e7c884c79d593ad5e6ad9324831a39270581d41f7ec8d14eaf04a38796df20f3bcc5caf9ff750cd33588697445c3440828bb269d9e7f8947c39fbcb4105a

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks