General

  • Target

    281815eb0a4ade0c28a64d9f5589ef8617006a8f60cb99d87065a462efa4fab0

  • Size

    78KB

  • Sample

    220616-csbbeaaeg2

  • MD5

    c9f4e2314818da2b06658920b8a1eb83

  • SHA1

    3b8b409fd7321aa8453c59e5dd99c1665622ab5c

  • SHA256

    281815eb0a4ade0c28a64d9f5589ef8617006a8f60cb99d87065a462efa4fab0

  • SHA512

    b047082b905b3be99090a26ec12354fbdf1bc0cca6263a9982575047784d0eab641ca1d842a1491ca54ff9d255e700931faef53ceb67fe405cc4cf64ae3c8987

Malware Config

Targets

    • Target

      281815eb0a4ade0c28a64d9f5589ef8617006a8f60cb99d87065a462efa4fab0

    • Size

      78KB

    • MD5

      c9f4e2314818da2b06658920b8a1eb83

    • SHA1

      3b8b409fd7321aa8453c59e5dd99c1665622ab5c

    • SHA256

      281815eb0a4ade0c28a64d9f5589ef8617006a8f60cb99d87065a462efa4fab0

    • SHA512

      b047082b905b3be99090a26ec12354fbdf1bc0cca6263a9982575047784d0eab641ca1d842a1491ca54ff9d255e700931faef53ceb67fe405cc4cf64ae3c8987

    • MetamorpherRAT

      Metamorpherrat is a hacking tool that has been around for a while since 2013.

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks