General

  • Target

    ignition.vbs

  • Size

    7KB

  • Sample

    241116-v8detavkbn

  • MD5

    b64ade0da62a91e454083bdd1941334a

  • SHA1

    acda54750b9aaa12f1d796e49e34649834e5add9

  • SHA256

    8dbe43f829e5570159a6d7e09da465b16894a9209203cc11620f974a73140568

  • SHA512

    5b0fb691cf8db530fc7a06a977300709576e44049fb89b538aea68867b3250750fdffcd999018ee80e9a2926f476e1d1154b192929a4bb0830dc0abb8b66f16b

  • SSDEEP

    192:EDZskGMOU0d02GNChlRD2YtYDdnlpzg/VLH:STGM9e02ECB2YWrpstLH

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://89.197.154.116:7810/eHF-4tVTnNnq3-vejdLJogPiK3ZJIfBMUU62cmVlE9wjtuWSickS7QKt5X9Hh9rbWOGSx3mSkw2thVfP2JbI7rn_FcQhaZ3C

Targets

    • Target

      ignition.vbs

    • Size

      7KB

    • MD5

      b64ade0da62a91e454083bdd1941334a

    • SHA1

      acda54750b9aaa12f1d796e49e34649834e5add9

    • SHA256

      8dbe43f829e5570159a6d7e09da465b16894a9209203cc11620f974a73140568

    • SHA512

      5b0fb691cf8db530fc7a06a977300709576e44049fb89b538aea68867b3250750fdffcd999018ee80e9a2926f476e1d1154b192929a4bb0830dc0abb8b66f16b

    • SSDEEP

      192:EDZskGMOU0d02GNChlRD2YtYDdnlpzg/VLH:STGM9e02ECB2YWrpstLH

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks