General

  • Target

    2662610dc5f01aa6d41fa53222b61aea879bc70475376b240597d209a6cb3480

  • Size

    692KB

  • Sample

    241213-ngep8sylgq

  • MD5

    d32e64d77779eb9e1f6996e9918bf35a

  • SHA1

    a0e7075e2d13fdefa4d689ad51c9a6d3294f0766

  • SHA256

    2662610dc5f01aa6d41fa53222b61aea879bc70475376b240597d209a6cb3480

  • SHA512

    82c0ebb69091e83e8bb99fcd0b41c4e583d9ea1b4b7b4eb14ffa78978c2f0630a251a29173f6699638f4c40168cfef60458b92d5ab25d2a05393aa92600b5c12

  • SSDEEP

    12288:q6f13oK/cDVrSs0SYnIhYqkoIgCJ1y0Vm1uIf59UcudQM9zU1Jok2fP4VT:q6ftojDBeSYnIqoCTywjGzh2

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Targets

    • Target

      2662610dc5f01aa6d41fa53222b61aea879bc70475376b240597d209a6cb3480

    • Size

      692KB

    • MD5

      d32e64d77779eb9e1f6996e9918bf35a

    • SHA1

      a0e7075e2d13fdefa4d689ad51c9a6d3294f0766

    • SHA256

      2662610dc5f01aa6d41fa53222b61aea879bc70475376b240597d209a6cb3480

    • SHA512

      82c0ebb69091e83e8bb99fcd0b41c4e583d9ea1b4b7b4eb14ffa78978c2f0630a251a29173f6699638f4c40168cfef60458b92d5ab25d2a05393aa92600b5c12

    • SSDEEP

      12288:q6f13oK/cDVrSs0SYnIhYqkoIgCJ1y0Vm1uIf59UcudQM9zU1Jok2fP4VT:q6ftojDBeSYnIqoCTywjGzh2

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks