General
-
Target
Downloads.zip
-
Size
48KB
-
Sample
241105-f4fxtavhlh
-
MD5
a993b040805a46a6f811c2f82ba15ac3
-
SHA1
0d739b4db6237a551a96f85824786858028b2f99
-
SHA256
85e90c7240f0d04c7a3e4cddabeb7afd17b3996382e0a83e905e346867a0b164
-
SHA512
0744cc48bbcf605b805f0c8168e7f631a1b31ba536de73e0ac6d89a6ff33025e786c5ff096c427bc882b7bb47b1ee70b3ecc7019167a859b055097989e140726
-
SSDEEP
1536:KqnGvA3RniIoOxShC51a5OtTHtPe+jCSON1:zGYRiIoOIC/asTHtDzg1
Behavioral task
behavioral1
Sample
53c9a6fc60f1b68e23f9a4060452d035af7e2eb73fec2f42b6012fc98417115a/53c9a6fc60f1b68e23f9a4060452d035af7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53c9a6fc60f1b68e23f9a4060452d035af7e2eb73fec2f42b6012fc98417115a/53c9a6fc60f1b68e23f9a4060452d035af7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
6fc8b5b8a90cf8ba7e0eb930fcdde776f8eeb3f37913318df7766a365e13fa8e/6fc8b5b8a90cf8ba7e0eb930fcdde776f8e.exe
Resource
win7-20241010-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
172.183.76.152:4444
Extracted
phorphiex
http://185.215.113.84
http://185.215.113.66
Targets
-
-
Target
53c9a6fc60f1b68e23f9a4060452d035af7e2eb73fec2f42b6012fc98417115a/53c9a6fc60f1b68e23f9a4060452d035af7e2eb73fec2f42b6012fc98417115a.exe
-
Size
72KB
-
MD5
449c0175718415174c3961728c7b48ba
-
SHA1
573e1558ba736edefc6a41dda6505f07b9eddfd8
-
SHA256
53c9a6fc60f1b68e23f9a4060452d035af7e2eb73fec2f42b6012fc98417115a
-
SHA512
423841097e9711322c647735f69a40105ca1a9a5d4245b92d1334909f6fde9d4ef2df195296b929c052022ba677c6705cdea6779f43f3cd767261b5bf9065efe
-
SSDEEP
1536:Ij2YmZ2WQAZ+4DRkT4Us96osMiq1Mb+KR0Nc8QsJq39:Iq2e1ixoNiue0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
-
-
Target
6fc8b5b8a90cf8ba7e0eb930fcdde776f8eeb3f37913318df7766a365e13fa8e/6fc8b5b8a90cf8ba7e0eb930fcdde776f8eeb3f37913318df7766a365e13fa8e.exe
-
Size
10KB
-
MD5
ed9fbbbe548c41479cb70e4d694793d0
-
SHA1
a0bde162d2241ab2acb58544511a41df30a096a7
-
SHA256
6fc8b5b8a90cf8ba7e0eb930fcdde776f8eeb3f37913318df7766a365e13fa8e
-
SHA512
49652367fec13a1e7a188fd039bf8a9fae6be72fdc31e7597bbcfdf30375277f6a7e09b74bd5a2adf1696cf720998c751b7e1671afa3a59c4dfa7069bca543fb
-
SSDEEP
192:Jd94uPG8E1CDSnzmgp+eMwY46BJxT43thW:394u5SCDSnJo+c83
-
Modifies security service
-
Phorphiex family
-
Phorphiex payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1