General

  • Target

    reverse_tcp_uuid.hta

  • Size

    7KB

  • Sample

    240530-e64k8afg35

  • MD5

    b177937631436154e4bbf6f577e127ed

  • SHA1

    0cf3505cc7a317f6ede0f2174c4b3fa3f1198d64

  • SHA256

    b59ee8a77c8d3311b14eb8850aee1e9230e1035dffe7c310529e1201bcbb74f1

  • SHA512

    f7a497976e8c4a37728495655b501223efb1e237ce794484fd56b7b95a69a54e1e2a3c16ec8523ddac93ce8c9fc08642588ee62e86fcb7a290d97b52efecadf5

  • SSDEEP

    192:bn2jh1hqT24RKhkbiC5w1VyFUqzmIsMRwYXWlQ4RF6hd9d:bn2jh1hsRRROiSVyF5mH019rhd9d

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

1.14.247.162:40001

Targets

    • Target

      reverse_tcp_uuid.hta

    • Size

      7KB

    • MD5

      b177937631436154e4bbf6f577e127ed

    • SHA1

      0cf3505cc7a317f6ede0f2174c4b3fa3f1198d64

    • SHA256

      b59ee8a77c8d3311b14eb8850aee1e9230e1035dffe7c310529e1201bcbb74f1

    • SHA512

      f7a497976e8c4a37728495655b501223efb1e237ce794484fd56b7b95a69a54e1e2a3c16ec8523ddac93ce8c9fc08642588ee62e86fcb7a290d97b52efecadf5

    • SSDEEP

      192:bn2jh1hqT24RKhkbiC5w1VyFUqzmIsMRwYXWlQ4RF6hd9d:bn2jh1hsRRROiSVyF5mH019rhd9d

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks