General

  • Target

    71a081183bbdf7902be62fe6d376dd49

  • Size

    256KB

  • Sample

    240124-h9yqxscha4

  • MD5

    71a081183bbdf7902be62fe6d376dd49

  • SHA1

    56cdd67a57a781bef5d32d02274361ac0065a6d0

  • SHA256

    bdaebb5a748736069f9df41f1cb6b9f0452e6968fa07c42ecea02599349b9958

  • SHA512

    80d6176527e3985d237e4e4dccbb4cad96d04e08a073baa46ca744f282fff4ce9727bff153c47e65faec7622b3df9478b5214c0c89b7564d5091886ee6eb6d11

  • SSDEEP

    3072:ccgs1P0Xb/Vi5UZQeZwGqQverUAIqCnUbGtwcmwg97ShOqP+iHTOI5iqTU61MiIs:Hgs50XbdMUZjlUzCnUsgVSkqPPdaiIs

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      71a081183bbdf7902be62fe6d376dd49

    • Size

      256KB

    • MD5

      71a081183bbdf7902be62fe6d376dd49

    • SHA1

      56cdd67a57a781bef5d32d02274361ac0065a6d0

    • SHA256

      bdaebb5a748736069f9df41f1cb6b9f0452e6968fa07c42ecea02599349b9958

    • SHA512

      80d6176527e3985d237e4e4dccbb4cad96d04e08a073baa46ca744f282fff4ce9727bff153c47e65faec7622b3df9478b5214c0c89b7564d5091886ee6eb6d11

    • SSDEEP

      3072:ccgs1P0Xb/Vi5UZQeZwGqQverUAIqCnUbGtwcmwg97ShOqP+iHTOI5iqTU61MiIs:Hgs50XbdMUZjlUzCnUsgVSkqPPdaiIs

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks