General

  • Target

    28bf49ee986e2f0152d77b0480fb1b3b92ddb8d997dec3023edb34d07fe3c0fd

  • Size

    170KB

  • Sample

    220919-djr38shdhj

  • MD5

    0f3f04033a86057e55817da6d1446b93

  • SHA1

    72b2b57944e7d1baf8afb829d61c559caeccdfda

  • SHA256

    28bf49ee986e2f0152d77b0480fb1b3b92ddb8d997dec3023edb34d07fe3c0fd

  • SHA512

    c59437e5e4a93101d0cad8f422db7d78c9d3475ca692dbacbe3df24adda63f3c0f7c8cd1b09db34c4eac1d68e8ff2182553b274eba238b8c21fd25f2c21f459c

  • SSDEEP

    3072:02MYnr+S1IPJ9P8pV0PByWYd+IkzPV0e0YCB9lV4FBTTLDNEnum6:wYfHGyWYQ3x0IIleFNPDOuB

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      28bf49ee986e2f0152d77b0480fb1b3b92ddb8d997dec3023edb34d07fe3c0fd

    • Size

      170KB

    • MD5

      0f3f04033a86057e55817da6d1446b93

    • SHA1

      72b2b57944e7d1baf8afb829d61c559caeccdfda

    • SHA256

      28bf49ee986e2f0152d77b0480fb1b3b92ddb8d997dec3023edb34d07fe3c0fd

    • SHA512

      c59437e5e4a93101d0cad8f422db7d78c9d3475ca692dbacbe3df24adda63f3c0f7c8cd1b09db34c4eac1d68e8ff2182553b274eba238b8c21fd25f2c21f459c

    • SSDEEP

      3072:02MYnr+S1IPJ9P8pV0PByWYd+IkzPV0e0YCB9lV4FBTTLDNEnum6:wYfHGyWYQ3x0IIleFNPDOuB

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks