General

  • Target

    c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc

  • Size

    46KB

  • Sample

    221201-jxqp8ahd47

  • MD5

    b48c2d67746e914b77d82680439259ce

  • SHA1

    f109cbac9552ea523a3aa91f6a1ba37ffeada30f

  • SHA256

    c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc

  • SHA512

    d161561e2a0a195a1cc86d953fbb25e2075225a13c39f11f6d8d7b1e63b115f757170c1a7b95fac1b26d0a92f0a5df59e9f223095d24ecb34a5f1a2b52654d4f

  • SSDEEP

    768:e2h7whenc4GleBqAbdKPlpBgOQteRXIOu3NrcEiMZQgY8AhUqQKKLO41mmRYTckB:n7u+IAbdKdpBgOpaOmNgEJQgY/QTO4MZ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc

    • Size

      46KB

    • MD5

      b48c2d67746e914b77d82680439259ce

    • SHA1

      f109cbac9552ea523a3aa91f6a1ba37ffeada30f

    • SHA256

      c5c39cbc727553f82ca5a18bf617a676cee8e4a60de22b80fbb2873f81e997fc

    • SHA512

      d161561e2a0a195a1cc86d953fbb25e2075225a13c39f11f6d8d7b1e63b115f757170c1a7b95fac1b26d0a92f0a5df59e9f223095d24ecb34a5f1a2b52654d4f

    • SSDEEP

      768:e2h7whenc4GleBqAbdKPlpBgOQteRXIOu3NrcEiMZQgY8AhUqQKKLO41mmRYTckB:n7u+IAbdKdpBgOpaOmNgEJQgY/QTO4MZ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks