General

  • Target

    68373f3535e6dbedc4a31e08cfd281e6a06bd3b78788941d895bb31728b4b7bb

  • Size

    1.8MB

  • Sample

    240515-nenv5aeg8y

  • MD5

    88afbc66224819a9153d7119ef2bb601

  • SHA1

    432a292bbeba3da0839071c04076456819094730

  • SHA256

    68373f3535e6dbedc4a31e08cfd281e6a06bd3b78788941d895bb31728b4b7bb

  • SHA512

    817f950af94a93d0fb4502b398d34dc79019ce7b9619294915eda3d502439912d61b86f5bec34a3e1db43c9e6a5298e292bdbbe99dccd33a7845ab5af8b18c43

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO099OGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Tx3IiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      68373f3535e6dbedc4a31e08cfd281e6a06bd3b78788941d895bb31728b4b7bb

    • Size

      1.8MB

    • MD5

      88afbc66224819a9153d7119ef2bb601

    • SHA1

      432a292bbeba3da0839071c04076456819094730

    • SHA256

      68373f3535e6dbedc4a31e08cfd281e6a06bd3b78788941d895bb31728b4b7bb

    • SHA512

      817f950af94a93d0fb4502b398d34dc79019ce7b9619294915eda3d502439912d61b86f5bec34a3e1db43c9e6a5298e292bdbbe99dccd33a7845ab5af8b18c43

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO099OGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Tx3IiW0MbQxA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks