General

  • Target

    e0b07a1befb9b349a26dd86c1b5f1f661b03a2f924f7aa4f3a635c7d588f5214

  • Size

    78KB

  • Sample

    240703-efcptawdqg

  • MD5

    c5706a55b024c37ec33e557bb68c40d3

  • SHA1

    5cbc24f96231c0141028a0b7c24a81c86888b49f

  • SHA256

    e0b07a1befb9b349a26dd86c1b5f1f661b03a2f924f7aa4f3a635c7d588f5214

  • SHA512

    a0b9f768a057f27b61d98fc53b798b0937f6ba9e5b53ed459f9a20b7aa7f5f2a01617e708a62cb17bf66f0b754d49778237e2d4dcc37bf379c29bd07a4f5ac5a

  • SSDEEP

    1536:Ay5jSJXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6O9/41Lo:Ay5jS5SyRxvhTzXPvCbW2Ut9/F

Malware Config

Targets

    • Target

      e0b07a1befb9b349a26dd86c1b5f1f661b03a2f924f7aa4f3a635c7d588f5214

    • Size

      78KB

    • MD5

      c5706a55b024c37ec33e557bb68c40d3

    • SHA1

      5cbc24f96231c0141028a0b7c24a81c86888b49f

    • SHA256

      e0b07a1befb9b349a26dd86c1b5f1f661b03a2f924f7aa4f3a635c7d588f5214

    • SHA512

      a0b9f768a057f27b61d98fc53b798b0937f6ba9e5b53ed459f9a20b7aa7f5f2a01617e708a62cb17bf66f0b754d49778237e2d4dcc37bf379c29bd07a4f5ac5a

    • SSDEEP

      1536:Ay5jSJXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtN6O9/41Lo:Ay5jS5SyRxvhTzXPvCbW2Ut9/F

    • MetamorpherRAT

      Metamorpherrat is a hacking tool that has been around for a while since 2013.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks