General

  • Target

    7aaee3faa3604e4360a018e1b5b00876

  • Size

    171KB

  • Sample

    231226-tdetqafehj

  • MD5

    7aaee3faa3604e4360a018e1b5b00876

  • SHA1

    30095527cb375c29ab38e183d13ff076951f29c7

  • SHA256

    1192a8bd32d59f04728dbfa094fc0ed752e156898a374eb706622c9e2f34eacb

  • SHA512

    30fc3abc1dcda89c348a225e072b0585a4c0cfbd6b895cf9ef147d14e0c3917ca67788fc146458aa0a8b46c195f437d1ff3373a79adbc5dbfaf27f5b197f3114

  • SSDEEP

    3072:F9daQL2x73UcR0USwtXlvOtTp3XZV3ai7OZ32sztZ9TxInVmydcfU:Fr3L47kcR0USwkp3XnKi7a3ZGKfU

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      7aaee3faa3604e4360a018e1b5b00876

    • Size

      171KB

    • MD5

      7aaee3faa3604e4360a018e1b5b00876

    • SHA1

      30095527cb375c29ab38e183d13ff076951f29c7

    • SHA256

      1192a8bd32d59f04728dbfa094fc0ed752e156898a374eb706622c9e2f34eacb

    • SHA512

      30fc3abc1dcda89c348a225e072b0585a4c0cfbd6b895cf9ef147d14e0c3917ca67788fc146458aa0a8b46c195f437d1ff3373a79adbc5dbfaf27f5b197f3114

    • SSDEEP

      3072:F9daQL2x73UcR0USwtXlvOtTp3XZV3ai7OZ32sztZ9TxInVmydcfU:Fr3L47kcR0USwkp3XnKi7a3ZGKfU

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks