General

  • Target

    a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd

  • Size

    2KB

  • Sample

    220725-tp87psdff3

  • MD5

    926e5a0589c28d9f9df27076309b69f1

  • SHA1

    f8a7a8376ed133b6875d4f008f49b1799b2cbe68

  • SHA256

    a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd

  • SHA512

    7bdc74249e1aa22fd0ed69c7709926e7137d386d61e00c958e8f12ec060980b482a69813ce3557ddbce901ac886ff0e2b30b2ddedc7f79b6c5c73eab7ee677ea

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://47.52.204.241:80/2Ypa

Targets

    • Target

      a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd

    • Size

      2KB

    • MD5

      926e5a0589c28d9f9df27076309b69f1

    • SHA1

      f8a7a8376ed133b6875d4f008f49b1799b2cbe68

    • SHA256

      a1be8ab1061d8dfa7fc2b82e256971ee110695e776e493c96625935f9143aebd

    • SHA512

      7bdc74249e1aa22fd0ed69c7709926e7137d386d61e00c958e8f12ec060980b482a69813ce3557ddbce901ac886ff0e2b30b2ddedc7f79b6c5c73eab7ee677ea

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks