General
-
Target
5c8c7b915723746c85c4dc9b6a41fdeb
-
Size
198KB
-
Sample
231226-ja64pabhgp
-
MD5
5c8c7b915723746c85c4dc9b6a41fdeb
-
SHA1
64d69ba21fad855baf6b0fbbe5759a44b58249c1
-
SHA256
31c99323dd974d5e8d36b931456d98252e4b6e188e9a4d9b4cc4952cb09ae3cb
-
SHA512
297ca119ca4d76c3ea0603dca5514ff288c6664da47a2bc63a407ac444db9efb243d5efffd6b75c132024a2447dd197d85c6c778d4e5162f4cab34d4d00720f7
-
SSDEEP
3072:uUo1HK6tMex5XQLWMVsfBne3WAPNSYEW4N9mV:vo1H2e7QLWMVsfBsWAcXzm
Static task
static1
Behavioral task
behavioral1
Sample
5c8c7b915723746c85c4dc9b6a41fdeb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c8c7b915723746c85c4dc9b6a41fdeb.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
5c8c7b915723746c85c4dc9b6a41fdeb
-
Size
198KB
-
MD5
5c8c7b915723746c85c4dc9b6a41fdeb
-
SHA1
64d69ba21fad855baf6b0fbbe5759a44b58249c1
-
SHA256
31c99323dd974d5e8d36b931456d98252e4b6e188e9a4d9b4cc4952cb09ae3cb
-
SHA512
297ca119ca4d76c3ea0603dca5514ff288c6664da47a2bc63a407ac444db9efb243d5efffd6b75c132024a2447dd197d85c6c778d4e5162f4cab34d4d00720f7
-
SSDEEP
3072:uUo1HK6tMex5XQLWMVsfBne3WAPNSYEW4N9mV:vo1H2e7QLWMVsfBsWAcXzm
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1