General

  • Target

    9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55

  • Size

    203KB

  • Sample

    240916-3kab9avhpb

  • MD5

    e28b8f9d02d44890d09099f68b329914

  • SHA1

    be447005c84a84cec99e9ba236e056d9277244d7

  • SHA256

    9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55

  • SHA512

    9c434a694920deb240ff0f3707a5705ff5c7d09aedf0a15cb9eefc51a6265dd41477011a44ce1621676b71af52d79d7378137c90476b7ca7cc375d439fc2333c

  • SSDEEP

    3072:4PvBxdw7brTsht8nK2ZzaHWdTC1EFWmGwJlHk2S8McSGfJIzlgDz9EbbwWNIZKbf:l7bioK2ouTC6FewJlV7YHZIz9EwKS

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55

    • Size

      203KB

    • MD5

      e28b8f9d02d44890d09099f68b329914

    • SHA1

      be447005c84a84cec99e9ba236e056d9277244d7

    • SHA256

      9230440aec3a46b96805fee5641b42516dba51465c5306638d1d0924c07b6a55

    • SHA512

      9c434a694920deb240ff0f3707a5705ff5c7d09aedf0a15cb9eefc51a6265dd41477011a44ce1621676b71af52d79d7378137c90476b7ca7cc375d439fc2333c

    • SSDEEP

      3072:4PvBxdw7brTsht8nK2ZzaHWdTC1EFWmGwJlHk2S8McSGfJIzlgDz9EbbwWNIZKbf:l7bioK2ouTC6FewJlV7YHZIz9EwKS

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks