General

  • Target

    e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c.exe

  • Size

    1.8MB

  • Sample

    240524-nmq1fsfc62

  • MD5

    789d6f366212cbfed66f17d8c5ddfdf5

  • SHA1

    4af75266f815629d268ba588f085e955182620ce

  • SHA256

    e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c

  • SHA512

    0972a22c149d6b0c618ae20ff53c715d0a905b3d7c7499e4db0e199edf47e23eb05499ffc9f5b0a23d97b7ba71420471ffce4ba6308761cc11c814024bba49ad

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09HOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1NxJIiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c.exe

    • Size

      1.8MB

    • MD5

      789d6f366212cbfed66f17d8c5ddfdf5

    • SHA1

      4af75266f815629d268ba588f085e955182620ce

    • SHA256

      e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c

    • SHA512

      0972a22c149d6b0c618ae20ff53c715d0a905b3d7c7499e4db0e199edf47e23eb05499ffc9f5b0a23d97b7ba71420471ffce4ba6308761cc11c814024bba49ad

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO09HOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1NxJIiW0MbQxA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks