General

  • Target

    1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7

  • Size

    297KB

  • Sample

    220607-w5nbaagah2

  • MD5

    5303cb67747f5acf1f784b3722946037

  • SHA1

    bf6fe9cbae47d4ce27fc5012897b95a0bda2cd1a

  • SHA256

    1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7

  • SHA512

    5eea1c89d1bb2655ee84d283260c4b808b21e04094b9a599a425f147da67d41db8232de6423df888fbc892e24625e7ef39d814b72d15d5401182583ed5ac3aa1

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7

    • Size

      297KB

    • MD5

      5303cb67747f5acf1f784b3722946037

    • SHA1

      bf6fe9cbae47d4ce27fc5012897b95a0bda2cd1a

    • SHA256

      1b845b30483d9a3fa395d610f3f458b90134f8d461657ac97d68fa5cb8df06c7

    • SHA512

      5eea1c89d1bb2655ee84d283260c4b808b21e04094b9a599a425f147da67d41db8232de6423df888fbc892e24625e7ef39d814b72d15d5401182583ed5ac3aa1

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks