General

  • Target

    302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00

  • Size

    1.8MB

  • Sample

    240603-s4hsmacd34

  • MD5

    3e651220b60822c71624cb74c4f746a5

  • SHA1

    5c9319481e00de0cec86986c0b0250d20b8841e3

  • SHA256

    302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00

  • SHA512

    3ea877f9fa94efa54a54d3589369d88008be0776517b4af960a38a2a74dcb2e46fdf23f5d4d2f2d9c45067cc86c38cbe0a9c77298fce19da328b211b8cb7e140

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09HOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Zx3IiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00

    • Size

      1.8MB

    • MD5

      3e651220b60822c71624cb74c4f746a5

    • SHA1

      5c9319481e00de0cec86986c0b0250d20b8841e3

    • SHA256

      302ca9e9b367db114658cfc32a391e2c1cbddb7c60c21d45de6d628d67339e00

    • SHA512

      3ea877f9fa94efa54a54d3589369d88008be0776517b4af960a38a2a74dcb2e46fdf23f5d4d2f2d9c45067cc86c38cbe0a9c77298fce19da328b211b8cb7e140

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO09HOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Zx3IiW0MbQxA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks