General

  • Target

    a0664401dd3675c7e8964377dae85321ecfc6a99e3cf8674614cfa55eb1a87d9

  • Size

    1.8MB

  • Sample

    241109-aq69yssmdy

  • MD5

    73755e8c34c3cddc877e220bf2c60857

  • SHA1

    cbb98457750196cc07e584c476b0659ff7928215

  • SHA256

    a0664401dd3675c7e8964377dae85321ecfc6a99e3cf8674614cfa55eb1a87d9

  • SHA512

    d852c18398f4b9c07f29759735dd17e68ad5d3f074fb5933d456352a38ff3c85e6e9618e780fde9da5bcfdc0fab7c7872f23b5994d283b78346be63776a47dbc

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09FOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Xx3IiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      a0664401dd3675c7e8964377dae85321ecfc6a99e3cf8674614cfa55eb1a87d9

    • Size

      1.8MB

    • MD5

      73755e8c34c3cddc877e220bf2c60857

    • SHA1

      cbb98457750196cc07e584c476b0659ff7928215

    • SHA256

      a0664401dd3675c7e8964377dae85321ecfc6a99e3cf8674614cfa55eb1a87d9

    • SHA512

      d852c18398f4b9c07f29759735dd17e68ad5d3f074fb5933d456352a38ff3c85e6e9618e780fde9da5bcfdc0fab7c7872f23b5994d283b78346be63776a47dbc

    • SSDEEP

      24576:/3vLRdVhZBK8NogWYO09FOGi933YiWdCMJ5QxmjwC/hR:/3d5ZQ1Xx3IiW0MbQxA

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks