General

  • Target

    4e165a47fa45d4878c83f44f4e09c70741d91cf15a0daece1e435a85c8c5c165N.exe

  • Size

    46KB

  • Sample

    241202-jwrk5awqay

  • MD5

    c94c2fbb6fc1a3d11deb8ce26c59e570

  • SHA1

    3c0f53d070d1cf9c394cb251f0b1ade11298fcf5

  • SHA256

    4e165a47fa45d4878c83f44f4e09c70741d91cf15a0daece1e435a85c8c5c165

  • SHA512

    d96929648223230094150f4872e99f8e6ce67d138af9fda026d8de22faf668697a895d830d2b85eb64aeeffa1d85d24ca93984a5322b1ebfd03a6a7ae8d84d2e

  • SSDEEP

    768:rPXmC3qIZ0DxyG5mrDhOi5Hw7SddGJcjshSz9EtKatFMSIuwamfp7:LXmWZ01ihOi5Hw7SR4hSz9EtKqZILa

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      4e165a47fa45d4878c83f44f4e09c70741d91cf15a0daece1e435a85c8c5c165N.exe

    • Size

      46KB

    • MD5

      c94c2fbb6fc1a3d11deb8ce26c59e570

    • SHA1

      3c0f53d070d1cf9c394cb251f0b1ade11298fcf5

    • SHA256

      4e165a47fa45d4878c83f44f4e09c70741d91cf15a0daece1e435a85c8c5c165

    • SHA512

      d96929648223230094150f4872e99f8e6ce67d138af9fda026d8de22faf668697a895d830d2b85eb64aeeffa1d85d24ca93984a5322b1ebfd03a6a7ae8d84d2e

    • SSDEEP

      768:rPXmC3qIZ0DxyG5mrDhOi5Hw7SddGJcjshSz9EtKatFMSIuwamfp7:LXmWZ01ihOi5Hw7SR4hSz9EtKqZILa

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks