General

  • Target

    b18d3fb4e7419b74a13d34262d432e6f37b19c816c017d1484138edd1c8a1923

  • Size

    66KB

  • Sample

    221205-w9ppxaee67

  • MD5

    723f9c7ccfb3de84ff4fd44f6be15637

  • SHA1

    bd89e34502e0a002bd9a0273636789e9a0d07502

  • SHA256

    b18d3fb4e7419b74a13d34262d432e6f37b19c816c017d1484138edd1c8a1923

  • SHA512

    dce994555bbb19f3d38e21e9a2c0b966cf0106281ed67b2f294f5f898bc2a37b121c189010f60d42b8e42b1c8198dafb3119168eb2a7daeeb3f6dd5eff944d1e

  • SSDEEP

    1536:5jtkNsAAQrNNVjABaqoiSUwiI4/WNPdDbzReJ2/:5j2SQr6BIbUwpvY2

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b18d3fb4e7419b74a13d34262d432e6f37b19c816c017d1484138edd1c8a1923

    • Size

      66KB

    • MD5

      723f9c7ccfb3de84ff4fd44f6be15637

    • SHA1

      bd89e34502e0a002bd9a0273636789e9a0d07502

    • SHA256

      b18d3fb4e7419b74a13d34262d432e6f37b19c816c017d1484138edd1c8a1923

    • SHA512

      dce994555bbb19f3d38e21e9a2c0b966cf0106281ed67b2f294f5f898bc2a37b121c189010f60d42b8e42b1c8198dafb3119168eb2a7daeeb3f6dd5eff944d1e

    • SSDEEP

      1536:5jtkNsAAQrNNVjABaqoiSUwiI4/WNPdDbzReJ2/:5j2SQr6BIbUwpvY2

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks