General

  • Target

    4245990f42509474bbc912a02a1e5216c4eb87ea200801e1028291b74e45e43b

  • Size

    28KB

  • Sample

    220614-jspblacgdp

  • MD5

    b37dde09771f84691575faad7ecd3f89

  • SHA1

    940bf33101e32ac140358dfa51071ffd1e96ca2a

  • SHA256

    4245990f42509474bbc912a02a1e5216c4eb87ea200801e1028291b74e45e43b

  • SHA512

    952ce6dd9a61a5d993e6c9bacd400b70b223a41e774558db962fa661413a8819798899e75a3dffbb1fa7e0d6fcb23d79bb9b9c1c5163d3ea7c6a433dfbe7ac8f

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://x4k.me:50443/static-directory/admin.gif

Targets

    • Target

      4245990f42509474bbc912a02a1e5216c4eb87ea200801e1028291b74e45e43b

    • Size

      28KB

    • MD5

      b37dde09771f84691575faad7ecd3f89

    • SHA1

      940bf33101e32ac140358dfa51071ffd1e96ca2a

    • SHA256

      4245990f42509474bbc912a02a1e5216c4eb87ea200801e1028291b74e45e43b

    • SHA512

      952ce6dd9a61a5d993e6c9bacd400b70b223a41e774558db962fa661413a8819798899e75a3dffbb1fa7e0d6fcb23d79bb9b9c1c5163d3ea7c6a433dfbe7ac8f

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks