General

  • Target

    429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527

  • Size

    60KB

  • Sample

    220819-pl8pjsdcaq

  • MD5

    faa390d3e31c24d2faa9dd9b39e14ad5

  • SHA1

    49d092488b9ef39f603c3446714f32bf6e0c80e7

  • SHA256

    429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527

  • SHA512

    1508a1ef58fb088958bf92575e55007cb80f4983a79d5cec72cb31ae132c30759f804bac9c9751d87cd081ef9d9a4e1c4113f8c8b1df226757e847117e6201f5

  • SSDEEP

    384:GSeTtcZyAXPAfIuwo6D7ZA90HPDNZsOKTwfiGDQfBX68uNbH/P89Z5N:aOyiDhTFpZ1KIiGaBBwP89

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

127.0.0.1:4444

Targets

    • Target

      429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527

    • Size

      60KB

    • MD5

      faa390d3e31c24d2faa9dd9b39e14ad5

    • SHA1

      49d092488b9ef39f603c3446714f32bf6e0c80e7

    • SHA256

      429dbbe9b229cf56554826cb142f3addcf848f6e701984c7020b1da05df1b527

    • SHA512

      1508a1ef58fb088958bf92575e55007cb80f4983a79d5cec72cb31ae132c30759f804bac9c9751d87cd081ef9d9a4e1c4113f8c8b1df226757e847117e6201f5

    • SSDEEP

      384:GSeTtcZyAXPAfIuwo6D7ZA90HPDNZsOKTwfiGDQfBX68uNbH/P89Z5N:aOyiDhTFpZ1KIiGaBBwP89

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks