General

  • Target

    3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3

  • Size

    5KB

  • Sample

    220703-klcvnaeed6

  • MD5

    4b128c58a8afdc3a838018142fdb4bea

  • SHA1

    73a1f572471d6cb23de20258d3db4860f82cac1c

  • SHA256

    3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3

  • SHA512

    3b1a1afa0729ed7d4d5f1c1fb8188e4ee007ad353a68255cb110a7940719d827ea9fc9cffd9074261c2d308f50c6ef5c324672188d33c5f8c56c3d83a6656ede

Malware Config

Extracted

Family

metasploit

Version

windows/exec

Targets

    • Target

      3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3

    • Size

      5KB

    • MD5

      4b128c58a8afdc3a838018142fdb4bea

    • SHA1

      73a1f572471d6cb23de20258d3db4860f82cac1c

    • SHA256

      3c15051a084a44625da869f347945191adea3ba8ed8c6830e92add6a2f0b4cd3

    • SHA512

      3b1a1afa0729ed7d4d5f1c1fb8188e4ee007ad353a68255cb110a7940719d827ea9fc9cffd9074261c2d308f50c6ef5c324672188d33c5f8c56c3d83a6656ede

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks