General

  • Target

    rtaf.jpg.exe

  • Size

    296KB

  • Sample

    201123-frvk786bpj

  • MD5

    ea7054a3d3341793c4cd89cc2f534ab6

  • SHA1

    ecbaf2abe657717c225c443b2713811f0a72e5d4

  • SHA256

    9813ed4b19619124cbbeefab28ad5f655bb826e0987333e8de016fcd94203d50

  • SHA512

    3ca0117dd0733f0d226798e0815d1014fe1ebf22a528073c0e61963710cff2c8c80c1bab184ed45521a04683eb8a15415281010d17130db6a9a1092afbb38f4f

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://45.138.172.81:80/jFIc

Attributes
  • headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MATBJS)

Targets

    • Target

      rtaf.jpg.exe

    • Size

      296KB

    • MD5

      ea7054a3d3341793c4cd89cc2f534ab6

    • SHA1

      ecbaf2abe657717c225c443b2713811f0a72e5d4

    • SHA256

      9813ed4b19619124cbbeefab28ad5f655bb826e0987333e8de016fcd94203d50

    • SHA512

      3ca0117dd0733f0d226798e0815d1014fe1ebf22a528073c0e61963710cff2c8c80c1bab184ed45521a04683eb8a15415281010d17130db6a9a1092afbb38f4f

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks