General

  • Target

    1efcb4d98521496a76ad4fdca2cc5409287630314870e3f0b40bef73ba2affc0

  • Size

    253KB

  • Sample

    221127-xfq7baaf47

  • MD5

    a51a0420e28042184bf5ee53fbb59d0d

  • SHA1

    dfde5764cee0039dd3ea9c3d2556bff5610e95e4

  • SHA256

    1efcb4d98521496a76ad4fdca2cc5409287630314870e3f0b40bef73ba2affc0

  • SHA512

    f0e485eccdd0460ae2ff29f3cf0d9cbcaec05612ecb91bebb5dba4d4a4e93b9506fb66892bed66eea311e5758ccc8688a7de5c688e38ad9a442edcf81ee63354

  • SSDEEP

    6144:bbtroggcHLwQHPuJAkHXBJeXr+sZu9S2D52/LE:3S8LwM8HXBJuxB/L

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      1efcb4d98521496a76ad4fdca2cc5409287630314870e3f0b40bef73ba2affc0

    • Size

      253KB

    • MD5

      a51a0420e28042184bf5ee53fbb59d0d

    • SHA1

      dfde5764cee0039dd3ea9c3d2556bff5610e95e4

    • SHA256

      1efcb4d98521496a76ad4fdca2cc5409287630314870e3f0b40bef73ba2affc0

    • SHA512

      f0e485eccdd0460ae2ff29f3cf0d9cbcaec05612ecb91bebb5dba4d4a4e93b9506fb66892bed66eea311e5758ccc8688a7de5c688e38ad9a442edcf81ee63354

    • SSDEEP

      6144:bbtroggcHLwQHPuJAkHXBJeXr+sZu9S2D52/LE:3S8LwM8HXBJuxB/L

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks