General

  • Target

    0cbf6c34e0568325d1b0ed98711c321df597e0a68c8d499cf70de5f7bf774580

  • Size

    1.8MB

  • Sample

    240911-yqj2eszhjf

  • MD5

    c5141165c877706f3ffa0ddc4134b2ec

  • SHA1

    04c8bfa7df7c262bb3d84e0aa7d32511cc8b6abb

  • SHA256

    0cbf6c34e0568325d1b0ed98711c321df597e0a68c8d499cf70de5f7bf774580

  • SHA512

    53fa48bd751a875e6a7ec83da42b4d52c3e6f8a72f240d4badba909b19946cc44b1d06fb64939cf30c156c0293f6cbf6c1ed55c773d63920a32377bf395864d3

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09WOGi9JbBodjwC/hR:/3d5ZQ12xJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      0cbf6c34e0568325d1b0ed98711c321df597e0a68c8d499cf70de5f7bf774580

    • Size

      1.8MB

    • MD5

      c5141165c877706f3ffa0ddc4134b2ec

    • SHA1

      04c8bfa7df7c262bb3d84e0aa7d32511cc8b6abb

    • SHA256

      0cbf6c34e0568325d1b0ed98711c321df597e0a68c8d499cf70de5f7bf774580

    • SHA512

      53fa48bd751a875e6a7ec83da42b4d52c3e6f8a72f240d4badba909b19946cc44b1d06fb64939cf30c156c0293f6cbf6c1ed55c773d63920a32377bf395864d3

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO09WOGi9JbBodjwC/hR:/3d5ZQ12xJ+

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks