General

  • Target

    1be00304d3b47ee886ab38c9ffa831a5dcbd0d087d7951462be7e3e0bbb24c9a

  • Size

    30KB

  • Sample

    220708-zgrwcagbfn

  • MD5

    1f99155b3e9e1aac1673e6a80424d956

  • SHA1

    ab70b90e6018c2d59aa4c8e48dabe28f94993c51

  • SHA256

    1be00304d3b47ee886ab38c9ffa831a5dcbd0d087d7951462be7e3e0bbb24c9a

  • SHA512

    bbbf9a93ac243d745eb7963a5829c500dbc41340f2333da4f8a40850dd43f1c353442a6d7613df0aafc62c3194050bdd3754c778a95c42bd410d2418f1a768fd

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://ctfd.top:8080/2nyC

Attributes
  • headers User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Host: ctfd.top

Targets

    • Target

      1be00304d3b47ee886ab38c9ffa831a5dcbd0d087d7951462be7e3e0bbb24c9a

    • Size

      30KB

    • MD5

      1f99155b3e9e1aac1673e6a80424d956

    • SHA1

      ab70b90e6018c2d59aa4c8e48dabe28f94993c51

    • SHA256

      1be00304d3b47ee886ab38c9ffa831a5dcbd0d087d7951462be7e3e0bbb24c9a

    • SHA512

      bbbf9a93ac243d745eb7963a5829c500dbc41340f2333da4f8a40850dd43f1c353442a6d7613df0aafc62c3194050bdd3754c778a95c42bd410d2418f1a768fd

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks