General

  • Target

    3a6c633e944ca4f32eace248bbec6de84d3ad3d89047910bda4342144cc7d1bc

  • Size

    198KB

  • Sample

    220919-dhvsqshdel

  • MD5

    47057df2357f8c2ab909c837a9fdcc2e

  • SHA1

    8fadbf2bb498b6148565a5e92f9d3f0e9b63b9db

  • SHA256

    3a6c633e944ca4f32eace248bbec6de84d3ad3d89047910bda4342144cc7d1bc

  • SHA512

    f69fba446c1bf6f2f9a4f6bac700e0d7726fc47ddd170514052358557ac554d51a20d2183a0f2a4879454849a6399e5e3f013d365310b7c865d3b8d86e7d874e

  • SSDEEP

    3072:CXG+uJi5O4JXPFR89NDn5ZZrq8NkJDBvUtFr/fvKzkaKL:CW6YRn5ZZhkJDhU7rvKI1L

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      3a6c633e944ca4f32eace248bbec6de84d3ad3d89047910bda4342144cc7d1bc

    • Size

      198KB

    • MD5

      47057df2357f8c2ab909c837a9fdcc2e

    • SHA1

      8fadbf2bb498b6148565a5e92f9d3f0e9b63b9db

    • SHA256

      3a6c633e944ca4f32eace248bbec6de84d3ad3d89047910bda4342144cc7d1bc

    • SHA512

      f69fba446c1bf6f2f9a4f6bac700e0d7726fc47ddd170514052358557ac554d51a20d2183a0f2a4879454849a6399e5e3f013d365310b7c865d3b8d86e7d874e

    • SSDEEP

      3072:CXG+uJi5O4JXPFR89NDn5ZZrq8NkJDBvUtFr/fvKzkaKL:CW6YRn5ZZhkJDhU7rvKI1L

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks