General

  • Target

    c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c

  • Size

    166KB

  • Sample

    220919-g6j8pagban

  • MD5

    69239f00ab177dd01230afca766ae13e

  • SHA1

    c85e3f5edc4c4f8d5483fc6e5c1e12003277601d

  • SHA256

    c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c

  • SHA512

    241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3

  • SSDEEP

    3072:actbm2OH6r0C5JC+YY0N83xnprEzfwUkjKr8:3rp5M+YY0eBnRExkWr8

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c

    • Size

      166KB

    • MD5

      69239f00ab177dd01230afca766ae13e

    • SHA1

      c85e3f5edc4c4f8d5483fc6e5c1e12003277601d

    • SHA256

      c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c

    • SHA512

      241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3

    • SSDEEP

      3072:actbm2OH6r0C5JC+YY0N83xnprEzfwUkjKr8:3rp5M+YY0eBnRExkWr8

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks