General

  • Target

    f02bb51dfbe714d0475327c95a8e406e8ee80892a5717b0ea41345df39bd74b5

  • Size

    1.7MB

  • Sample

    240417-mqnh3adh3y

  • MD5

    1445b48111cedf2ac017788eaeaee624

  • SHA1

    fa607c0fdf147e4dbfadc37ffef0a0cc08b4bf7b

  • SHA256

    f02bb51dfbe714d0475327c95a8e406e8ee80892a5717b0ea41345df39bd74b5

  • SHA512

    28494d3d78dadfe9e45bd959f52efca679b4a2cb7783c0a1d27ad70f7740d12aecb24c6e8870995e5bc666161f30fa1868c87a62b9d18d79ddcca36b5b5b9400

  • SSDEEP

    24576:GVP4iQzePuruuXj/cz86edKl7DLwkCTpLH9ZVm+nzEG6GvmhhbnCydBA+bAW1ej:GWBj/czxedKFCTpRZdzEjAm9bK

Malware Config

Targets

    • Target

      f02bb51dfbe714d0475327c95a8e406e8ee80892a5717b0ea41345df39bd74b5

    • Size

      1.7MB

    • MD5

      1445b48111cedf2ac017788eaeaee624

    • SHA1

      fa607c0fdf147e4dbfadc37ffef0a0cc08b4bf7b

    • SHA256

      f02bb51dfbe714d0475327c95a8e406e8ee80892a5717b0ea41345df39bd74b5

    • SHA512

      28494d3d78dadfe9e45bd959f52efca679b4a2cb7783c0a1d27ad70f7740d12aecb24c6e8870995e5bc666161f30fa1868c87a62b9d18d79ddcca36b5b5b9400

    • SSDEEP

      24576:GVP4iQzePuruuXj/cz86edKl7DLwkCTpLH9ZVm+nzEG6GvmhhbnCydBA+bAW1ej:GWBj/czxedKFCTpRZdzEjAm9bK

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks