General

  • Target

    2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4

  • Size

    107KB

  • Sample

    221124-bfxs7scb7y

  • MD5

    274a992b90460b31dfb26595a69606d1

  • SHA1

    9a76f9be0787dae4730f6577beb93b649ce5b9ea

  • SHA256

    2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4

  • SHA512

    e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e

  • SSDEEP

    3072:GfgUXWFKNlw1bbhJltZrpRV7Nwh2Ep69t96ghyP:igUXWF+m1bbJthpz7Nwh2GK6gm

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4

    • Size

      107KB

    • MD5

      274a992b90460b31dfb26595a69606d1

    • SHA1

      9a76f9be0787dae4730f6577beb93b649ce5b9ea

    • SHA256

      2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4

    • SHA512

      e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e

    • SSDEEP

      3072:GfgUXWFKNlw1bbhJltZrpRV7Nwh2Ep69t96ghyP:igUXWF+m1bbJthpz7Nwh2GK6gm

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks