General

  • Target

    ftyy6.exe

  • Size

    112KB

  • Sample

    240923-y7kz2szekj

  • MD5

    12d8ab57264221d75ad61ad4c44ca0a9

  • SHA1

    d34170576d85ad51102d99ec2ce80777952910cf

  • SHA256

    cc82a28b5143e3343cccd5e1bef91464e321fdafebd4638a3e76d7fd565a3866

  • SHA512

    9ceedfeae8871524f55b9d2c3184814840ac328ecfd9e310fb213cc47e7ab460fcc37b6bcf2290856791158acfbf740bb224b29f0ae79a52f14ab9c9949b10b5

  • SSDEEP

    3072:omQub/u/E9NdbpPRz92lQBV+UdE+rECWp7hK8:DDWkfBV+UdvrEFp7hK8

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      ftyy6.exe

    • Size

      112KB

    • MD5

      12d8ab57264221d75ad61ad4c44ca0a9

    • SHA1

      d34170576d85ad51102d99ec2ce80777952910cf

    • SHA256

      cc82a28b5143e3343cccd5e1bef91464e321fdafebd4638a3e76d7fd565a3866

    • SHA512

      9ceedfeae8871524f55b9d2c3184814840ac328ecfd9e310fb213cc47e7ab460fcc37b6bcf2290856791158acfbf740bb224b29f0ae79a52f14ab9c9949b10b5

    • SSDEEP

      3072:omQub/u/E9NdbpPRz92lQBV+UdE+rECWp7hK8:DDWkfBV+UdvrEFp7hK8

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies firewall policy service

    • Modifies security service

    • Drops file in Drivers directory

    • Deletes itself

    • Executes dropped EXE

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks