General

  • Target

    d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043

  • Size

    347KB

  • Sample

    220919-cs8lxaccg7

  • MD5

    5180d37dfabb7fa22fd7f1a02fc4babb

  • SHA1

    af3037f4c8f0300fa47c71261d70355d3ac66a9a

  • SHA256

    d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043

  • SHA512

    1c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937

  • SSDEEP

    6144:MxLjTaCEbW1gIPp6nlml+19yxKpbj+mYl+eL:MxWBi3E11pbymYlV

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043

    • Size

      347KB

    • MD5

      5180d37dfabb7fa22fd7f1a02fc4babb

    • SHA1

      af3037f4c8f0300fa47c71261d70355d3ac66a9a

    • SHA256

      d3a5ce6ad491e40495d04c7c715e927d6fd72f3b8101f8c3f8cfc6a1e4d9a043

    • SHA512

      1c1d9ce8f9fe0b1ddac632e532acbb585fec40adc4fcab554db05b0ce4ad17dd672163d916b45e66b67cf2ad68ec018c2137da27408a328b4c28022df82f1937

    • SSDEEP

      6144:MxLjTaCEbW1gIPp6nlml+19yxKpbj+mYl+eL:MxWBi3E11pbymYlV

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks