General

  • Target

    reverse_tcp.hta

  • Size

    7KB

  • Sample

    240530-e64k8aeg4v

  • MD5

    4e99f0feadde2839ac462ed6916bfd07

  • SHA1

    1830781cc5f224a68b64bc96d93f10b59b7122b7

  • SHA256

    8022b173111766352a7a3c42480505eba6391a170950505a9d539a9fcf4f2ab3

  • SHA512

    a189491fcacfc9eaecb1c31d706f77b3b6d96ab0d0079e60e7b01bdcba67b0a7b0ebf415e708276212875d479847b00ee2a7aaf40865dc73b3cda64a83d8dd1e

  • SSDEEP

    192:8n2jh1hqT2dcgE65MfDnQ8BQb1STDaIsF6hd9d:8n2jh1hsYsXQehT+Mhd9d

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

1.14.247.162:40001

Targets

    • Target

      reverse_tcp.hta

    • Size

      7KB

    • MD5

      4e99f0feadde2839ac462ed6916bfd07

    • SHA1

      1830781cc5f224a68b64bc96d93f10b59b7122b7

    • SHA256

      8022b173111766352a7a3c42480505eba6391a170950505a9d539a9fcf4f2ab3

    • SHA512

      a189491fcacfc9eaecb1c31d706f77b3b6d96ab0d0079e60e7b01bdcba67b0a7b0ebf415e708276212875d479847b00ee2a7aaf40865dc73b3cda64a83d8dd1e

    • SSDEEP

      192:8n2jh1hqT2dcgE65MfDnQ8BQb1STDaIsF6hd9d:8n2jh1hsYsXQehT+Mhd9d

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks