General

  • Target

    6bed7ef049d8d9728a09a94488ac8670c9c20c0e6c294f80fd2153c37a2bead7

  • Size

    83KB

  • Sample

    220701-eygrgsbgfl

  • MD5

    b3cd1fbbfa7e1fcf124ebb986db5925b

  • SHA1

    90ef51a3601f6c4fc4a588e4f911c0dcc0b7df83

  • SHA256

    6bed7ef049d8d9728a09a94488ac8670c9c20c0e6c294f80fd2153c37a2bead7

  • SHA512

    084ea2e44662bacea593479e7289102569b721df327e49a10ee42495197f10bf3b0b8a8cd033b2d9b1c435ce76f92308d65152d2d2baf3902ff5578c56a84323

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.47:4444

Targets

    • Target

      6bed7ef049d8d9728a09a94488ac8670c9c20c0e6c294f80fd2153c37a2bead7

    • Size

      83KB

    • MD5

      b3cd1fbbfa7e1fcf124ebb986db5925b

    • SHA1

      90ef51a3601f6c4fc4a588e4f911c0dcc0b7df83

    • SHA256

      6bed7ef049d8d9728a09a94488ac8670c9c20c0e6c294f80fd2153c37a2bead7

    • SHA512

      084ea2e44662bacea593479e7289102569b721df327e49a10ee42495197f10bf3b0b8a8cd033b2d9b1c435ce76f92308d65152d2d2baf3902ff5578c56a84323

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks