General

  • Target

    b9a2b7c4356f1a3e94af4cb9536d09e142653ca24058ebb7be6ad0fcc9ffd880

  • Size

    1.8MB

  • Sample

    240503-x1ap3ade8y

  • MD5

    f469f76e4487dd62a40741f2c79d00c9

  • SHA1

    2c0c355e67dbf4eb5ab098d5d0be725d5c173ee4

  • SHA256

    b9a2b7c4356f1a3e94af4cb9536d09e142653ca24058ebb7be6ad0fcc9ffd880

  • SHA512

    00ffce0ae05a832a363a77e6cefc92f0d7f4a239ffc295087a0f5751b7cb98605bc3db68c5b508de9c0bb2d29bfe2ea2e5ae276d68cfa26c626758d4ab35d58a

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09AOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ18x3IiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      b9a2b7c4356f1a3e94af4cb9536d09e142653ca24058ebb7be6ad0fcc9ffd880

    • Size

      1.8MB

    • MD5

      f469f76e4487dd62a40741f2c79d00c9

    • SHA1

      2c0c355e67dbf4eb5ab098d5d0be725d5c173ee4

    • SHA256

      b9a2b7c4356f1a3e94af4cb9536d09e142653ca24058ebb7be6ad0fcc9ffd880

    • SHA512

      00ffce0ae05a832a363a77e6cefc92f0d7f4a239ffc295087a0f5751b7cb98605bc3db68c5b508de9c0bb2d29bfe2ea2e5ae276d68cfa26c626758d4ab35d58a

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO09AOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ18x3IiW0MbQxA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks