General

  • Target

    fdec9eaad75c2d67b38aa105302dfa5dc12cb9f333acc3bfe5779cf2c477bfe1

  • Size

    448KB

  • Sample

    201108-961pxm6ty2

  • MD5

    375316de7af369db663e71f5af74a300

  • SHA1

    130151b5eb85b91c1dae0afde52fadec84e9e474

  • SHA256

    fdec9eaad75c2d67b38aa105302dfa5dc12cb9f333acc3bfe5779cf2c477bfe1

  • SHA512

    9c0195b529934ce185fd362e1a18606e718ba4a0c91fb5899819acd73fabe3a1488bb80b0bb075fcb1a3b8d8c84c4e93e28ff227c3b8f39509774ad6a33c4b04

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

78.128.113.238:9090

Targets

    • Target

      fdec9eaad75c2d67b38aa105302dfa5dc12cb9f333acc3bfe5779cf2c477bfe1

    • Size

      448KB

    • MD5

      375316de7af369db663e71f5af74a300

    • SHA1

      130151b5eb85b91c1dae0afde52fadec84e9e474

    • SHA256

      fdec9eaad75c2d67b38aa105302dfa5dc12cb9f333acc3bfe5779cf2c477bfe1

    • SHA512

      9c0195b529934ce185fd362e1a18606e718ba4a0c91fb5899819acd73fabe3a1488bb80b0bb075fcb1a3b8d8c84c4e93e28ff227c3b8f39509774ad6a33c4b04

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks