General

  • Target

    c993c6d0b6435f0d581dc1564321a2f485435e90152546bf2fdb79a4a5f3a8dd

  • Size

    3.7MB

  • Sample

    240629-e5z7eatgmp

  • MD5

    4fcb38f72900884de000d6b31a3b7283

  • SHA1

    29ffe01229ca98a9724749d8e5400b868a4f6c2d

  • SHA256

    c993c6d0b6435f0d581dc1564321a2f485435e90152546bf2fdb79a4a5f3a8dd

  • SHA512

    f8a04170bde430c691fc99b249b2cb4ac088295f523599837b18857775607fa9894057d846330ccccca35e7e0677801d2fa7b51073547c375b03dc2fba652295

  • SSDEEP

    98304:h1W+kIBGY5GK8/5b1mYCKC0peAMA9kRvv44J4P8w:hI+38/51C+peAMAynzJ4P8

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.204.138:1234

Targets

    • Target

      c993c6d0b6435f0d581dc1564321a2f485435e90152546bf2fdb79a4a5f3a8dd

    • Size

      3.7MB

    • MD5

      4fcb38f72900884de000d6b31a3b7283

    • SHA1

      29ffe01229ca98a9724749d8e5400b868a4f6c2d

    • SHA256

      c993c6d0b6435f0d581dc1564321a2f485435e90152546bf2fdb79a4a5f3a8dd

    • SHA512

      f8a04170bde430c691fc99b249b2cb4ac088295f523599837b18857775607fa9894057d846330ccccca35e7e0677801d2fa7b51073547c375b03dc2fba652295

    • SSDEEP

      98304:h1W+kIBGY5GK8/5b1mYCKC0peAMA9kRvv44J4P8w:hI+38/51C+peAMAynzJ4P8

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks