General

  • Target

    4c8787570302e7148c642dad96fc9d6b93fb5a16a85ca855367345ed5eb00a8d

  • Size

    75KB

  • Sample

    220919-ay7kpachhl

  • MD5

    279cc2e644d4bfec689f55763cd266da

  • SHA1

    c51fb332f8b2b39069837533b1c5dcc5801325a7

  • SHA256

    4c8787570302e7148c642dad96fc9d6b93fb5a16a85ca855367345ed5eb00a8d

  • SHA512

    1b8babf0dc4679ea1200512188d9f345229f62c56365322e6d6d0f5a51cad0f3ea10c6a2ff47d9c52d40dc69413402865236a9dd0a4f8605afd2a9f2da66405b

  • SSDEEP

    1536:as7FAkC51YnMRlwl6i46Cvrx0NUzzb/EbdU+HeXG:aAxC5aMRlwlN6vrx0ezwbdUSZ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      tester.exe

    • Size

      123KB

    • MD5

      97dc996e0452430e8baf53892eab60af

    • SHA1

      8954401eac73256dd11bc237a9f473af8f24cb4f

    • SHA256

      4b06e671abc4b73aaa4382637592f863a23267ba85c2c878a12972cb72b904b4

    • SHA512

      cee7bae760e351866dea0515f40eda7aca218b30c05e01ae34ff145bdf2e6efe9e8ccd087ab904c8b5b7e797c21f1a350789659f29b06c1d151875cc8e85b742

    • SSDEEP

      3072:sEvb4VxIJBCL3ce5ncyzG23UbuasNPp4boJi0oIDVc/hIPGl/CKWMCs13ymXh:s0b4VxIJBCL3ce5ncyzG23UbuasNPp45

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks