Resubmissions

22-05-2022 17:58

220522-wj59zaebak 10

22-05-2022 16:50

220522-vb7x6aaff6 10

General

  • Target

    TFG_modificado.pdf

  • Size

    105KB

  • Sample

    220522-vb7x6aaff6

  • MD5

    3f40220500ee4514ca088297e70613ed

  • SHA1

    07e9ed05f62671596688c37eaffca357b25969ea

  • SHA256

    53b43327329e3199b64f29d34de75c2d345e43fc7b42e4b74ecceec81575b205

  • SHA512

    c4988c1ee38d3ceb22c616d6c943b79148721590a8efe38172098eac9b5259fb6e700ced4ae967ec6816cea1159c29dd327c2cf44e78a90b5919d5888e9108c2

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.2.15:4444

Targets

    • Target

      TFG_modificado.pdf

    • Size

      105KB

    • MD5

      3f40220500ee4514ca088297e70613ed

    • SHA1

      07e9ed05f62671596688c37eaffca357b25969ea

    • SHA256

      53b43327329e3199b64f29d34de75c2d345e43fc7b42e4b74ecceec81575b205

    • SHA512

      c4988c1ee38d3ceb22c616d6c943b79148721590a8efe38172098eac9b5259fb6e700ced4ae967ec6816cea1159c29dd327c2cf44e78a90b5919d5888e9108c2

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

    • Target

      TFG.pdf

    • Size

      72KB

    • MD5

      c8eda58fbac22e5b0d33f547c858b9f1

    • SHA1

      143df53b62f5b2eb2bb2cd2bd70c7882c1c3df2d

    • SHA256

      178d1de119f2315d86e78d16e81d34544fbccae169b1d30db4db1be5e82a4574

    • SHA512

      6de0398890ed6cbd05459b7308d9e7265f53bc42f4ea7472be0a7ea0e846224c3a3cfcd7387b06ebe7630d52c7bf211e5dd9409d13f0c535781d1654c1c0c72d

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks