General

  • Target

    a31c17a0_by_Libranalysis

  • Size

    156KB

  • Sample

    210509-p9jpmjx3ts

  • MD5

    a31c17a0a4a0d3caf0472c747c890d1a

  • SHA1

    2022484abc139e3643dcf2e1f29a0e52564e738f

  • SHA256

    0685a699fb13d6bc99b6aee35381acf77b00155d56e7448a300aa308fd07598c

  • SHA512

    b551814e1056a96298fab0de7bdc3d746ff7db07cdb0d3b5dc39ee8fc260e03de8b7b329226ce8dbc50bcd809bb8d335fd0de7f2eddf5748d1ed990b5ff0af14

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

3.141.210.37:18573

Targets

    • Target

      a31c17a0_by_Libranalysis

    • Size

      156KB

    • MD5

      a31c17a0a4a0d3caf0472c747c890d1a

    • SHA1

      2022484abc139e3643dcf2e1f29a0e52564e738f

    • SHA256

      0685a699fb13d6bc99b6aee35381acf77b00155d56e7448a300aa308fd07598c

    • SHA512

      b551814e1056a96298fab0de7bdc3d746ff7db07cdb0d3b5dc39ee8fc260e03de8b7b329226ce8dbc50bcd809bb8d335fd0de7f2eddf5748d1ed990b5ff0af14

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks