General

  • Target

    5a65e4b822a31fdfed2051c11edaaa89

  • Size

    525KB

  • Sample

    231226-hg74wsheg6

  • MD5

    5a65e4b822a31fdfed2051c11edaaa89

  • SHA1

    61747ddc2c29f2fea860c8d0829e438ef66a32e9

  • SHA256

    39b8223acf5a3a8a7102bb297d750a12654e1192cf7d55a01cf5561efa323b9c

  • SHA512

    1ff035836bd0f2143b696bb93def60c4c55d9cdc99a1aafc723b140122ecf001714f0580c54cf749499ea3cc4033ea386193e351ad7a8f77aa4b56557e1ce00d

  • SSDEEP

    6144:dwVPqTSTVFhaae3OR3wxJXSMaAA4OUi1DZyRn5ERmnfN/05YacxIBnn8H2QYvM4X:Gxfw3OR3cdAV51ch5ERa/3nxIl4i6A/

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      5a65e4b822a31fdfed2051c11edaaa89

    • Size

      525KB

    • MD5

      5a65e4b822a31fdfed2051c11edaaa89

    • SHA1

      61747ddc2c29f2fea860c8d0829e438ef66a32e9

    • SHA256

      39b8223acf5a3a8a7102bb297d750a12654e1192cf7d55a01cf5561efa323b9c

    • SHA512

      1ff035836bd0f2143b696bb93def60c4c55d9cdc99a1aafc723b140122ecf001714f0580c54cf749499ea3cc4033ea386193e351ad7a8f77aa4b56557e1ce00d

    • SSDEEP

      6144:dwVPqTSTVFhaae3OR3wxJXSMaAA4OUi1DZyRn5ERmnfN/05YacxIBnn8H2QYvM4X:Gxfw3OR3cdAV51ch5ERa/3nxIl4i6A/

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks