General
-
Target
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
-
Size
136KB
-
Sample
220919-mnbfqachh5
-
MD5
2e0080e607b406cb64f82d909a7f458e
-
SHA1
ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
-
SHA256
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
-
SHA512
ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b
-
SSDEEP
3072:waBTBRR+7lzPZdGbhfwFIWNc8HJJPz2/CNSvR9UiFDrK5Py2mFGCtwk:wukJPubhfwFPpJPqCNSHFKPy2VU
Static task
static1
Behavioral task
behavioral1
Sample
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
-
Size
136KB
-
MD5
2e0080e607b406cb64f82d909a7f458e
-
SHA1
ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
-
SHA256
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
-
SHA512
ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b
-
SSDEEP
3072:waBTBRR+7lzPZdGbhfwFIWNc8HJJPz2/CNSvR9UiFDrK5Py2mFGCtwk:wukJPubhfwFPpJPqCNSHFKPy2VU
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-