General

  • Target

    1684595269.msi

  • Size

    156KB

  • Sample

    230521-gkz21sba71

  • MD5

    105cc98da1b269d77db92e6998462cc8

  • SHA1

    e7892f87d61ba1d366998035eb87133f6ae7b31c

  • SHA256

    8be9351da65a0f148748811354cce67b7e47e6be9605979c05ec686e6a8a8462

  • SHA512

    da3a4438addbb91a7379a632058d3d9df0a32cdcdef8a098847562397d1adeb45c6d76616be18dfe89a7bd32656e113847239e487e80060c3159605eabd47b9c

  • SSDEEP

    384:iHpe4ZvJXK7gzFM7Wu8agcjEoXgZs+5BCq26yy3M5BCqPN:Zmxa7gBMyuKDCUyWMDC

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

101.42.247.160:12311

Targets

    • Target

      1684595269.msi

    • Size

      156KB

    • MD5

      105cc98da1b269d77db92e6998462cc8

    • SHA1

      e7892f87d61ba1d366998035eb87133f6ae7b31c

    • SHA256

      8be9351da65a0f148748811354cce67b7e47e6be9605979c05ec686e6a8a8462

    • SHA512

      da3a4438addbb91a7379a632058d3d9df0a32cdcdef8a098847562397d1adeb45c6d76616be18dfe89a7bd32656e113847239e487e80060c3159605eabd47b9c

    • SSDEEP

      384:iHpe4ZvJXK7gzFM7Wu8agcjEoXgZs+5BCq26yy3M5BCqPN:Zmxa7gBMyuKDCUyWMDC

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks