General

  • Target

    aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312dd

  • Size

    1.8MB

  • Sample

    241104-jq88zsxhjr

  • MD5

    2af084d560905b629add7d1aeea1e3c0

  • SHA1

    0683da90a8aeb6847dcd5aa53c06046e41a0ed3c

  • SHA256

    aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312dd

  • SHA512

    0da4e730b901f8c1c6a2ff4252b3689dbc46ce44ba539983e0caf4a29bd5123e93e239693ebdb87fa826dd240b97458edcc68e13a73d592b5d378f7b6ae3eb9b

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09wOGi9JbBodjwC/hR:/3d5ZQ1QxJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312dd

    • Size

      1.8MB

    • MD5

      2af084d560905b629add7d1aeea1e3c0

    • SHA1

      0683da90a8aeb6847dcd5aa53c06046e41a0ed3c

    • SHA256

      aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312dd

    • SHA512

      0da4e730b901f8c1c6a2ff4252b3689dbc46ce44ba539983e0caf4a29bd5123e93e239693ebdb87fa826dd240b97458edcc68e13a73d592b5d378f7b6ae3eb9b

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO09wOGi9JbBodjwC/hR:/3d5ZQ1QxJ+

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks