General

  • Target

    befe9d7a09bb48dac73b8122892a92ecc8dd118f06ee29992ca63365ccedf324

  • Size

    196KB

  • Sample

    221206-v58rjscb5t

  • MD5

    b797d2ac0430cba053425712b1cb0da6

  • SHA1

    159e9e8ef4fb6356045e4df3b3c87b5a7652798c

  • SHA256

    befe9d7a09bb48dac73b8122892a92ecc8dd118f06ee29992ca63365ccedf324

  • SHA512

    4b14532b07798c9049652b7b4cb03c19783dec421c06fb76ce69d23009b7edd6ec1a2874cb2811210a3d0a199431337bb9f10dd23ff1a46a62d9c23d764a9eee

  • SSDEEP

    3072:ew1Hhb4wftEoTlLPt1GiIFB4k9HDQogKUtz1/cmWZb/Kl:RBiAP9Pt1GTFyceKM1/cPZWl

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      befe9d7a09bb48dac73b8122892a92ecc8dd118f06ee29992ca63365ccedf324

    • Size

      196KB

    • MD5

      b797d2ac0430cba053425712b1cb0da6

    • SHA1

      159e9e8ef4fb6356045e4df3b3c87b5a7652798c

    • SHA256

      befe9d7a09bb48dac73b8122892a92ecc8dd118f06ee29992ca63365ccedf324

    • SHA512

      4b14532b07798c9049652b7b4cb03c19783dec421c06fb76ce69d23009b7edd6ec1a2874cb2811210a3d0a199431337bb9f10dd23ff1a46a62d9c23d764a9eee

    • SSDEEP

      3072:ew1Hhb4wftEoTlLPt1GiIFB4k9HDQogKUtz1/cmWZb/Kl:RBiAP9Pt1GTFyceKM1/cPZWl

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks