General
Target

28435fa2051fa4bf5425d52b5c1b16781e4b2553be726b152796eaf9d1d49581

Size

2MB

Sample

220630-wnx46afber

Score
10/10
MD5

6056cb47164323c9bacfea777afffe0f

SHA1

678e3415cad90165942024bb1a00a886685f1b83

SHA256

28435fa2051fa4bf5425d52b5c1b16781e4b2553be726b152796eaf9d1d49581

SHA512

5616f5cc04221b676cdb21ae2c3283fbb64f8435c5ab18ba9f310f916675c5ba0b919fa03e2bba79da346cea6a0ece0b385866916a77ee941152becac8c842d8

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.10.3:5555

Targets
Target

28435fa2051fa4bf5425d52b5c1b16781e4b2553be726b152796eaf9d1d49581

MD5

6056cb47164323c9bacfea777afffe0f

Filesize

2MB

Score
10/10
SHA1

678e3415cad90165942024bb1a00a886685f1b83

SHA256

28435fa2051fa4bf5425d52b5c1b16781e4b2553be726b152796eaf9d1d49581

SHA512

5616f5cc04221b676cdb21ae2c3283fbb64f8435c5ab18ba9f310f916675c5ba0b919fa03e2bba79da346cea6a0ece0b385866916a77ee941152becac8c842d8

Tags

Signatures

  • MetaSploit

    Description

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          Score
                          N/A

                          behavioral1

                          Score
                          10/10

                          behavioral2

                          Score
                          10/10