General

  • Target

    dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe

  • Size

    201KB

  • Sample

    241231-rlp9bawpfk

  • MD5

    bf8a7b506a5f26093e63a800fef9e100

  • SHA1

    d0b12fc85d0ec865ca36c51e5b78de5622f3f8fc

  • SHA256

    dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b

  • SHA512

    7e2fa195d328c62351bca4b13bc7fcade72b57693fea499d21d4829eb184e1d6febe269eea3c3aa64259095abbf33371177ac9be3ce5229985cba57be2c472dd

  • SSDEEP

    3072:CaDpZ+xJi1hHw7U3zNwP6uRw8LL260748sgCCn/vSPWn3CwE56JdoSh7+AgeHXoj:CSvhHw7cfrTPNCwEYJdlQAgR1N

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe

    • Size

      201KB

    • MD5

      bf8a7b506a5f26093e63a800fef9e100

    • SHA1

      d0b12fc85d0ec865ca36c51e5b78de5622f3f8fc

    • SHA256

      dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b

    • SHA512

      7e2fa195d328c62351bca4b13bc7fcade72b57693fea499d21d4829eb184e1d6febe269eea3c3aa64259095abbf33371177ac9be3ce5229985cba57be2c472dd

    • SSDEEP

      3072:CaDpZ+xJi1hHw7U3zNwP6uRw8LL260748sgCCn/vSPWn3CwE56JdoSh7+AgeHXoj:CSvhHw7cfrTPNCwEYJdlQAgR1N

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks