IoCs/metamorfo.md at master · jeFF0Falltrades/IoCs
Common Information
Type Value
UUID 27843925-cf5a-4a6e-936f-de839cb1bd3d
Fingerprint 2640b86d23d5e3b9
Analysis status DONE
Considered CTI value 2
Text language
Published Jan. 1, 2022, midnight
Added to db Sept. 26, 2022, 9:31 a.m.
Last updated Nov. 17, 2024, 5:57 p.m.
Headline Metamorfo (aka Casbaneiro)
Title IoCs/metamorfo.md at master · jeFF0Falltrades/IoCs
Detected Hints/Tags/Attributes 9/1/34
Attributes
Details Type #Events CTI Value
Details Domain 1
metamorfo.md
Details Domain 96
malpedia.caad.fkie.fraunhofer.de
Details Domain 5
blog.ensilo.com
Details Domain 1
sfsfsdgfbd456416.zip
Details Domain 2
buleva.webcindario.com
Details Domain 13
s3-eu-west-1.amazonaws.com
Details Domain 2
s3.eu-west-2.amazonaws.com
Details Domain 2
modpumms2003.zip
Details Domain 2
s3.eu-west-3.amazonaws.com
Details Domain 2
modpmabrilzada.zip
Details Domain 2
mod1803xrd.zip
Details sha256 1
22c51c43fe8344d36005613209fecb9219b06abfdb12e3019876eca0d1495e23
Details sha256 1
d663f2c1a5075b43cc2706d58ae98dbb4b1ab168d5c99b43d5cb0b80e18937cf
Details sha256 1
0113d8a67b61dd6163b003c806d997f1f26da9df316744571aa1295c7ffb9995
Details sha256 1
1bb9382349266630cfc2f36d2af3c8b06ba4b153867161bf44143f952d33680b
Details sha256 1
3f9a7292c3b4837477ef5d8181fae11e827753a575f0ee852546fe64c79389ab
Details sha256 1
42c82a811f4eb41e1a6c613c9b017b7e8abf062c3694cb77e671464954facf3b
Details sha256 1
67255c29a1b2fcc1f9067f08fcf575a2d654e4f8d235a5a583ff2605b7728455
Details sha256 1
77ca06b5bd03556261e7f2359eaaad2c220771618456d9128b1750eef3fa2b8e
Details sha256 1
8aa574ba92ef3177d786c519d9f2acc86aa7d16afd44819cb23eddd28720776c
Details sha256 1
d9114962efbc4f34b093bd04e5d41000ebd416fcc8a6d68faeb7455d64d78081
Details IPv4 1
80.211.252.12
Details Url 1
https://malpedia.caad.fkie.fraunhofer.de/details/win.metamorfo
Details Url 1
https://blog.trendmicro.com/trendlabs-security-intelligence/analysis-abuse-of-custom-actions-in-windows-installer-msi-to-run-malicious-javascript-vbscript-and-powershell-scripts
Details Url 1
https://blog.ensilo.com/metamorfo-avast-abuser
Details Url 1
http://80.211.252.12/sfsfsdgfbd456416.zip
Details Url 1
http://buleva.webcindario.com/01
Details Url 2
https://s3-eu-west-1.amazonaws.com/disenyrt3/image2.png
Details Url 2
https://s3-eu-west-1.amazonaws.com/sharknadorki/image2.png
Details Url 2
https://s3-eu-west-1.amazonaws.com/jasonrwk5wg/image2.png
Details Url 2
https://s3.eu-west-2.amazonaws.com/stocksoftbr/modpumms2003.zip
Details Url 2
https://s3.eu-west-3.amazonaws.com/abrilgeralll/modpmabrilzada.zip
Details Url 2
https://s3.eu-west-2.amazonaws.com/stocksoftbr/mod1803xrd.zip
Details Yara rule 1
rule metamorfo_msi {
	meta:
		author = "jeFF0Falltrades"
		ref = "https://blog.trendmicro.com/trendlabs-security-intelligence/analysis-abuse-of-custom-actions-in-windows-installer-msi-to-run-malicious-javascript-vbscript-and-powershell-scripts/"
		description = "This is a simple, albeit effective rule to detect most Metamorfo initial MSI payloads"
	strings:
		$str_1 = "replace( \" pussy \" , idpp)" ascii wide nocase
		$str_2 = "GAIPV+idpp+ \"\\\\\" +idpp" ascii wide nocase
		$str_3 = "StrReverse( \" TEG \" )" ascii wide nocase
		$str_4 = "taller 12.2.1" ascii wide nocase
		$str_5 = "$bExisteArquivoLog" ascii wide nocase
		$str_6 = "function unzip(zipfile, unzipdir)" ascii wide nocase
		$str_7 = "DonaLoad(ArquivoDown" ascii wide nocase
		$str_8 = "putt_start" ascii wide nocase
		$str_9 = "FilesInZip= zipzipp" ascii wide nocase
		$str_10 = "@ u s e r p r o f i l e @ \" +ppasta" ascii wide nocase
		$str_11 = "getFolder(unzipdir).Path" ascii wide nocase
	condition:
		2 of them
}