General

  • Target

    4298eef0abacb1a3387ceaa6e3c5ec0551049069711cd7391f5ef80e2f08a154N

  • Size

    250KB

  • Sample

    241107-18ln3szbpf

  • MD5

    8a2801219d642c0da797e680d58f7700

  • SHA1

    85d3dff3f0352d37c02f0d9e8592cb04ab3e1194

  • SHA256

    4298eef0abacb1a3387ceaa6e3c5ec0551049069711cd7391f5ef80e2f08a154

  • SHA512

    d852db44b8dfc6e7d9f1468bc0cdf6669abc638b5a11e04e5aa253ea8566761bc759753a88bd613860ae009f1d7365d0df05c9eb5ecb8b04735a6b7916af77f2

  • SSDEEP

    3072:FMtmR5tiqzQ7SvHly/pipJ7PqNvMBNOnTIPtTLgBHMsXnTtKnA1Z9CjA+YB:itw5vlbXjIVTIlTLgBHMsAnAf9CDYB

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      4298eef0abacb1a3387ceaa6e3c5ec0551049069711cd7391f5ef80e2f08a154N

    • Size

      250KB

    • MD5

      8a2801219d642c0da797e680d58f7700

    • SHA1

      85d3dff3f0352d37c02f0d9e8592cb04ab3e1194

    • SHA256

      4298eef0abacb1a3387ceaa6e3c5ec0551049069711cd7391f5ef80e2f08a154

    • SHA512

      d852db44b8dfc6e7d9f1468bc0cdf6669abc638b5a11e04e5aa253ea8566761bc759753a88bd613860ae009f1d7365d0df05c9eb5ecb8b04735a6b7916af77f2

    • SSDEEP

      3072:FMtmR5tiqzQ7SvHly/pipJ7PqNvMBNOnTIPtTLgBHMsXnTtKnA1Z9CjA+YB:itw5vlbXjIVTIlTLgBHMsAnAf9CDYB

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks