General

  • Target

    48ae459933d4ce8d8adc82834f3b0dad6dbe069c6b3f21a425f6a0698f2c2c3d

  • Size

    198KB

  • Sample

    220919-mmk9jachf2

  • MD5

    7b1fe3528fb63fc0573650953adc7389

  • SHA1

    43a2b2a1e1a664f8090351af73f9ebf2d83b0683

  • SHA256

    48ae459933d4ce8d8adc82834f3b0dad6dbe069c6b3f21a425f6a0698f2c2c3d

  • SHA512

    15ed12ffdc646a629a438a5c8f5285bff6930acfaaf9fdb0026fe48012d72a1652eedb094a2dadacc2257a0672e167e31c30b3a8c99512f4887ab4056562c072

  • SSDEEP

    3072:zvHRBCFK1tO+o77x/qB7QoP2GhyGYnbD6aUFHT7EfljEnUjAdDZdIlhzji:zvHXCF8oPxirPdhGbD6aWE4UjAPChq

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      48ae459933d4ce8d8adc82834f3b0dad6dbe069c6b3f21a425f6a0698f2c2c3d

    • Size

      198KB

    • MD5

      7b1fe3528fb63fc0573650953adc7389

    • SHA1

      43a2b2a1e1a664f8090351af73f9ebf2d83b0683

    • SHA256

      48ae459933d4ce8d8adc82834f3b0dad6dbe069c6b3f21a425f6a0698f2c2c3d

    • SHA512

      15ed12ffdc646a629a438a5c8f5285bff6930acfaaf9fdb0026fe48012d72a1652eedb094a2dadacc2257a0672e167e31c30b3a8c99512f4887ab4056562c072

    • SSDEEP

      3072:zvHRBCFK1tO+o77x/qB7QoP2GhyGYnbD6aUFHT7EfljEnUjAdDZdIlhzji:zvHXCF8oPxirPdhGbD6aWE4UjAPChq

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks