General

  • Target

    fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020

  • Size

    227KB

  • Sample

    221203-bh8cqabg99

  • MD5

    1926d5d9eb5e4354f18083916de108f0

  • SHA1

    f54ca406b5d189b19bdd2124c71660b921945cdb

  • SHA256

    fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020

  • SHA512

    32a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5

  • SSDEEP

    3072:mq6zDsoY9iUeCRvRpR5RhD/HzkfVtLrNFSDg6w3x5VdO3huCFOnYit8aQ:mqKC9X/L/cVtLxthdGhvOf

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020

    • Size

      227KB

    • MD5

      1926d5d9eb5e4354f18083916de108f0

    • SHA1

      f54ca406b5d189b19bdd2124c71660b921945cdb

    • SHA256

      fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020

    • SHA512

      32a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5

    • SSDEEP

      3072:mq6zDsoY9iUeCRvRpR5RhD/HzkfVtLrNFSDg6w3x5VdO3huCFOnYit8aQ:mqKC9X/L/cVtLxthdGhvOf

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Tasks