General

  • Target

    6e1f87e51a0e7711403f75f2e76eef63

  • Size

    45KB

  • Sample

    240121-3jbtpaccg5

  • MD5

    6e1f87e51a0e7711403f75f2e76eef63

  • SHA1

    6577d07aba67beb8697716e2180813f06e23a397

  • SHA256

    b8f038fd11b8dec71bc2602f86bacec23c314e52380cc89e0e21a1e772e24c3c

  • SHA512

    fd1e66f7cfa4f7e652be1ff99bb08a54274c8670a9a11f9da311db67c56bc210ef1904ba9c39b551d664df238e1b56d78709faaca4834f6ec9822de8d6c2b3ba

  • SSDEEP

    768:UNZeUS2mykVi2PN+1nQZtTik3MB7dLQd/+vxs6rZ:4/mPV/PNQQyeMB79yM

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      6e1f87e51a0e7711403f75f2e76eef63

    • Size

      45KB

    • MD5

      6e1f87e51a0e7711403f75f2e76eef63

    • SHA1

      6577d07aba67beb8697716e2180813f06e23a397

    • SHA256

      b8f038fd11b8dec71bc2602f86bacec23c314e52380cc89e0e21a1e772e24c3c

    • SHA512

      fd1e66f7cfa4f7e652be1ff99bb08a54274c8670a9a11f9da311db67c56bc210ef1904ba9c39b551d664df238e1b56d78709faaca4834f6ec9822de8d6c2b3ba

    • SSDEEP

      768:UNZeUS2mykVi2PN+1nQZtTik3MB7dLQd/+vxs6rZ:4/mPV/PNQQyeMB79yM

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks