General

  • Target

    e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e

  • Size

    793KB

  • Sample

    240921-zhmm1ssgpk

  • MD5

    12c839c0e82ac3e3a2d6ed2ee1f2e698

  • SHA1

    03cc269fd70629bac04fb52034c77c76a3c0bede

  • SHA256

    e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e

  • SHA512

    3ec422007988adda3c96febce17801d15278cd95a3f85009e4f0741e441b5c1ac630a688a34dd4f73923b548f50bb8a08961ee8415f40628b5965d03de24ee7b

  • SSDEEP

    24576:L6ftojDBeSYnItP3CZt6IZx89W0CxV9asvCpm2:LLp9oItfmf8Alm

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e

    • Size

      793KB

    • MD5

      12c839c0e82ac3e3a2d6ed2ee1f2e698

    • SHA1

      03cc269fd70629bac04fb52034c77c76a3c0bede

    • SHA256

      e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e

    • SHA512

      3ec422007988adda3c96febce17801d15278cd95a3f85009e4f0741e441b5c1ac630a688a34dd4f73923b548f50bb8a08961ee8415f40628b5965d03de24ee7b

    • SSDEEP

      24576:L6ftojDBeSYnItP3CZt6IZx89W0CxV9asvCpm2:LLp9oItfmf8Alm

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks