General
-
Target
a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1
-
Size
1.8MB
-
Sample
220625-lzjqsshgg8
-
MD5
d82cf866082b643af2e30bc6e2d2b5d5
-
SHA1
e4a416739bbde89e3fe7d613e6d421c282f2a22d
-
SHA256
a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1
-
SHA512
b71ff0d14b59877dca3bf45a164b7d93a23e48520e055a1f7b25a021a257871633a5ec99182f65425b47f78b1e4020bd4d031299e4586ea22ba07e0c83339de4
Static task
static1
Behavioral task
behavioral1
Sample
a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
193.37.213.221:56300
Targets
-
-
Target
a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1
-
Size
1.8MB
-
MD5
d82cf866082b643af2e30bc6e2d2b5d5
-
SHA1
e4a416739bbde89e3fe7d613e6d421c282f2a22d
-
SHA256
a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1
-
SHA512
b71ff0d14b59877dca3bf45a164b7d93a23e48520e055a1f7b25a021a257871633a5ec99182f65425b47f78b1e4020bd4d031299e4586ea22ba07e0c83339de4
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies visiblity of hidden/system files in Explorer
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Executes dropped EXE
-
Stops running service(s)
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1