Malware Analysis Report

2025-01-03 08:14

Sample ID 240704-gfyy6azbje
Target 6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce
SHA256 6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce
Tags
metasploit backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce

Threat Level: Known bad

The file 6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor trojan

Metasploit family

MetaSploit

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-04 05:45

Signatures

Metasploit family

metasploit

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-04 05:45

Reported

2024-07-04 05:48

Platform

win10v2004-20240611-en

Max time kernel

135s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce.exe

"C:\Users\Admin\AppData\Local\Temp\6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce.exe"

C:\Windows\SysWOW64\cmd.exe

cmd

Network

Country Destination Domain Proto
BR 144.22.38.242:4444 tcp
US 8.8.8.8:53 242.38.22.144.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 92.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

memory/848-0-0x0000000000870000-0x0000000000871000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-04 05:45

Reported

2024-07-04 05:48

Platform

win11-20240611-en

Max time kernel

123s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce.exe

"C:\Users\Admin\AppData\Local\Temp\6b62ba17ce64e744807c767d24eafaff88595ae7762f1f4691a510f0c2c518ce.exe"

C:\Windows\SysWOW64\cmd.exe

cmd

Network

Country Destination Domain Proto
BR 144.22.38.242:4444 tcp
US 8.8.8.8:53 242.38.22.144.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp

Files

memory/4200-0-0x0000000000550000-0x0000000000551000-memory.dmp