General

  • Target

    fd73ca5d4d35bc6b724c74a7749312192abe305b5fabdbaa41fad5530ef698dd

  • Size

    192KB

  • Sample

    221205-tkbqmsed83

  • MD5

    293505f9609f38289cb0d2e6ced3209d

  • SHA1

    a688030a4b528657533fbdc30d2006c54792bd92

  • SHA256

    fd73ca5d4d35bc6b724c74a7749312192abe305b5fabdbaa41fad5530ef698dd

  • SHA512

    0c23a21cf81ad691c64f385966af6969aa7023f2c1aea56f762eb3ce4d2bc582c3496b3ba78c61e291ec5a66f6dd84012c27147507617c45a54d8dc8fbddea61

  • SSDEEP

    3072:hG8eUjcGtWZ7ldZkfnNZwcJHkJ1ADYUrU1dJqYUOsfwlS:KJImZkvARkD3UAYZsfwlS

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      fd73ca5d4d35bc6b724c74a7749312192abe305b5fabdbaa41fad5530ef698dd

    • Size

      192KB

    • MD5

      293505f9609f38289cb0d2e6ced3209d

    • SHA1

      a688030a4b528657533fbdc30d2006c54792bd92

    • SHA256

      fd73ca5d4d35bc6b724c74a7749312192abe305b5fabdbaa41fad5530ef698dd

    • SHA512

      0c23a21cf81ad691c64f385966af6969aa7023f2c1aea56f762eb3ce4d2bc582c3496b3ba78c61e291ec5a66f6dd84012c27147507617c45a54d8dc8fbddea61

    • SSDEEP

      3072:hG8eUjcGtWZ7ldZkfnNZwcJHkJ1ADYUrU1dJqYUOsfwlS:KJImZkvARkD3UAYZsfwlS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks