General

  • Target

    92e875cbfd1e8c71d1c72df50e586a23bae16aae68ce73dd390a348ad2d9e3c2

  • Size

    141KB

  • Sample

    221203-gnh8nsae37

  • MD5

    889270a067578729a4c7cbf0160d4a75

  • SHA1

    622c17ca9219ea136e5df786f55cd3cd97212ee4

  • SHA256

    92e875cbfd1e8c71d1c72df50e586a23bae16aae68ce73dd390a348ad2d9e3c2

  • SHA512

    626dab51cb6806c0c4e3b0e941e7c94982dd5a529eafc642fa441b89dbc80e33a8d3b81842802810a89ce3a995d9c40dd41be1274d29038358ed6e05d8edf7d0

  • SSDEEP

    3072:A4YNSelXjMy8gYIeeLcmNlgkXSqfWMYnYZfYJbaf8z2WCmW:A4mcgxeeLcmNy9aWMYEfTWc

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      92e875cbfd1e8c71d1c72df50e586a23bae16aae68ce73dd390a348ad2d9e3c2

    • Size

      141KB

    • MD5

      889270a067578729a4c7cbf0160d4a75

    • SHA1

      622c17ca9219ea136e5df786f55cd3cd97212ee4

    • SHA256

      92e875cbfd1e8c71d1c72df50e586a23bae16aae68ce73dd390a348ad2d9e3c2

    • SHA512

      626dab51cb6806c0c4e3b0e941e7c94982dd5a529eafc642fa441b89dbc80e33a8d3b81842802810a89ce3a995d9c40dd41be1274d29038358ed6e05d8edf7d0

    • SSDEEP

      3072:A4YNSelXjMy8gYIeeLcmNlgkXSqfWMYnYZfYJbaf8z2WCmW:A4mcgxeeLcmNy9aWMYEfTWc

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks