General

  • Target

    56013e1500734411d3c713de3f50e9d31d623eae7ee350695482b9f7af4f27a0

  • Size

    236KB

  • Sample

    220725-gw21raabar

  • MD5

    b816b87e15e662250cba295b83ab452f

  • SHA1

    50fc96dbc2d21e285fede9777b9c913dff59c8ea

  • SHA256

    56013e1500734411d3c713de3f50e9d31d623eae7ee350695482b9f7af4f27a0

  • SHA512

    cc4102d54b9299684c1fca11d87351370cc67a0b7cd52bb8535bf9ef2d39296dc697991a669ffcb0f2e327d831300e04cc235e252080391528c6a834753bcd0f

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      56013e1500734411d3c713de3f50e9d31d623eae7ee350695482b9f7af4f27a0

    • Size

      236KB

    • MD5

      b816b87e15e662250cba295b83ab452f

    • SHA1

      50fc96dbc2d21e285fede9777b9c913dff59c8ea

    • SHA256

      56013e1500734411d3c713de3f50e9d31d623eae7ee350695482b9f7af4f27a0

    • SHA512

      cc4102d54b9299684c1fca11d87351370cc67a0b7cd52bb8535bf9ef2d39296dc697991a669ffcb0f2e327d831300e04cc235e252080391528c6a834753bcd0f

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • suricata: ET MALWARE IRC Nick change on non-standard port

      suricata: ET MALWARE IRC Nick change on non-standard port

    • suricata: ET MALWARE Likely Bot Nick in IRC (USA +..)

      suricata: ET MALWARE Likely Bot Nick in IRC (USA +..)

    • Adds policy Run key to start application

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks