General

  • Target

    9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671

  • Size

    136KB

  • Sample

    220919-mnbfqachh5

  • MD5

    2e0080e607b406cb64f82d909a7f458e

  • SHA1

    ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce

  • SHA256

    9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671

  • SHA512

    ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b

  • SSDEEP

    3072:waBTBRR+7lzPZdGbhfwFIWNc8HJJPz2/CNSvR9UiFDrK5Py2mFGCtwk:wukJPubhfwFPpJPqCNSHFKPy2VU

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671

    • Size

      136KB

    • MD5

      2e0080e607b406cb64f82d909a7f458e

    • SHA1

      ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce

    • SHA256

      9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671

    • SHA512

      ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b

    • SSDEEP

      3072:waBTBRR+7lzPZdGbhfwFIWNc8HJJPz2/CNSvR9UiFDrK5Py2mFGCtwk:wukJPubhfwFPpJPqCNSHFKPy2VU

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks