General

  • Target

    a7385206a51f983247ee46f08d750167.exe

  • Size

    308KB

  • Sample

    201119-bmh23kxgle

  • MD5

    a7385206a51f983247ee46f08d750167

  • SHA1

    c311c6a3bbb7a3cdaea4aff121a57eb928f3d0a6

  • SHA256

    013bb5ea2d163409cdad34f882c151db05da4e4dcd50fe68049f27e6e4454694

  • SHA512

    e61a7a95947a827bf51714e2ec26b7365e5311d76ca576ff1aa33ec8b3b06576e821643c968ed7cfd396daaa9988a97a6533b81c5c95955e8002ee151c77a96b

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://tcpsessionsconnect.com:443/sKJT

Targets

    • Target

      a7385206a51f983247ee46f08d750167.exe

    • Size

      308KB

    • MD5

      a7385206a51f983247ee46f08d750167

    • SHA1

      c311c6a3bbb7a3cdaea4aff121a57eb928f3d0a6

    • SHA256

      013bb5ea2d163409cdad34f882c151db05da4e4dcd50fe68049f27e6e4454694

    • SHA512

      e61a7a95947a827bf51714e2ec26b7365e5311d76ca576ff1aa33ec8b3b06576e821643c968ed7cfd396daaa9988a97a6533b81c5c95955e8002ee151c77a96b

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks