General

  • Target

    4c8e978b010a37c740e8b557a6f490c3.bin

  • Size

    330KB

  • Sample

    240116-bzr23aaegq

  • MD5

    4c8e978b010a37c740e8b557a6f490c3

  • SHA1

    6661df1fb45fb7a31a928bad905fb5f6dddba978

  • SHA256

    1e4b3abd4c517a286c610010e9aa1b9ce442f31be5b16678d084ec3c91a73802

  • SHA512

    3b037d07c9a82c4851cd6746134d46e2a9ada5a93ca59658a97a08e0e0d9abd1b38621c1c2880a5015cfc0683749a5ec5540ce126fbe528dfbb386dcbc3f718b

  • SSDEEP

    6144:TH3TcSCVrQ+AoixpWJLnbKhfGTnzalM6bSiYN7ktsbPP2dnn3ZtBmbaRkOktI/gq:XVC5QU1nuOzW6uNYN7ktWA3PBmbaRTXN

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      Ransomware.GoldenEye.exe

    • Size

      254KB

    • MD5

      e3b7d39be5e821b59636d0fe7c2944cc

    • SHA1

      00479a97e415e9b6a5dfb5d04f5d9244bc8fbe88

    • SHA256

      389a7d395492c2da6f8abf5a8a7c49c3482f7844f77fe681808c71e961bcae97

    • SHA512

      8f977c60658063051968049245512b6aea68dd89005d0eefde26e4b2757210e9e95aabcef9aee173f57614b52cfbac924d36516b7bc7d3a5cc67daae4dee3ad5

    • SSDEEP

      3072:iTAjnioLO7WpLyLNZMcPSK7BaZ0NwAWMGc0HfmY4KsyyOiy12KJ3I4YgTl:i6nrD0ZMcPBAL7c0fTHs+2sYXg

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Target

      Ransomware.GoldenEye.js

    • Size

      365KB

    • MD5

      c4e9fc349d5c8b24c0ddb1533de2c16b

    • SHA1

      147e938bd06709b3c20eea4ac461093d573be037

    • SHA256

      28fd3a1d9087d7b103b7f6cfca002798b6365fe6ebcc66fa02dbb4a9e6378e71

    • SHA512

      fd0cf6f434e665aabc91f6095394a08483990c12a0b6ad3a1bd820b740af0ddbc02bc0a2592be429c7488b3cd2889afad8f758b4258009dfe51e9faac76842be

    • SSDEEP

      6144:Jnm5mwYxm+DzkzFIDIWCy49ezGywT7PDSzT3enlJ1BJ0exGqkIb1Taha6e2T6Huv:FnaIEWeqWdnlhJ+eHHu+1Qk3C+MAQ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks