Resubmissions

23-09-2023 14:56

230923-sa9z1sgf6v 10

22-09-2023 16:04

230922-thw9kaba83 10

22-09-2023 16:01

230922-tf9f4shb2y 10

General

  • Target

    https://mega.nz/file/I10QUThQ#Anbkjc-YrdZPf7fecurNRZcgElIZtB6RdAWa5zR-ecc4

  • Sample

    230923-sa9z1sgf6v

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

172.94.88.173:5500

Targets

    • Target

      https://mega.nz/file/I10QUThQ#Anbkjc-YrdZPf7fecurNRZcgElIZtB6RdAWa5zR-ecc4

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies WinLogon for persistence

    • UAC bypass

    • Windows security bypass

    • Nirsoft

    • Modifies Installed Components in the registry

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks