Malware Analysis Report

2025-06-16 03:32

Sample ID 240405-x8bx4aca2w
Target 227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda
SHA256 227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda
Tags
upx metasploit backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda

Threat Level: Known bad

The file 227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda was found to be: Known bad.

Malicious Activity Summary

upx metasploit backdoor trojan

Metasploit family

UPX dump on OEP (original entry point)

MetaSploit

UPX dump on OEP (original entry point)

UPX packed file

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-05 19:31

Signatures

Metasploit family

metasploit

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-05 19:31

Reported

2024-04-05 19:33

Platform

win7-20240319-en

Max time kernel

148s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda.exe"

Signatures

MetaSploit

trojan backdoor metasploit

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda.exe

"C:\Users\Admin\AppData\Local\Temp\227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda.exe"

Network

Country Destination Domain Proto
N/A 192.168.124.19:8088 tcp

Files

memory/1404-0-0x0000000000400000-0x0000000000419000-memory.dmp

memory/1404-1-0x0000000000020000-0x0000000000021000-memory.dmp

memory/1404-2-0x0000000000400000-0x0000000000419000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-05 19:31

Reported

2024-04-05 19:33

Platform

win10v2004-20240226-en

Max time kernel

148s

Max time network

165s

Command Line

"C:\Users\Admin\AppData\Local\Temp\227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda.exe"

Signatures

MetaSploit

trojan backdoor metasploit

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda.exe

"C:\Users\Admin\AppData\Local\Temp\227d6ba5c7e955cb0435f28a6f51404fd1f0b6749691d3ecd611bbe85dbadeda.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4392 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
N/A 192.168.124.19:8088 tcp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 218.138.73.23.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
DE 172.217.18.10:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 pki.goog udp
US 8.8.8.8:53 pki.goog udp
US 216.239.32.29:80 pki.goog tcp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 10.18.217.172.in-addr.arpa udp
US 8.8.8.8:53 29.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 243.137.73.23.in-addr.arpa udp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

memory/4732-0-0x0000000000400000-0x0000000000419000-memory.dmp

memory/4732-1-0x0000000000670000-0x0000000000671000-memory.dmp

memory/4732-2-0x0000000000400000-0x0000000000419000-memory.dmp