Resubmissions

12/06/2023, 09:08

230612-k3y48abg41 10

03/06/2023, 05:45

230603-gf14hsfg22 10

General

  • Target

    shell444.msi

  • Size

    156KB

  • Sample

    230603-gf14hsfg22

  • MD5

    237333fa0ad0a1535befa1ed7a4e227b

  • SHA1

    d5ee5ea16376b64828d148f3f1a15be5154cf771

  • SHA256

    138810d2f0a3b9654c3ee32406759db2544b6d916f09e09e5c0e255d44b4b987

  • SHA512

    ca2ee8047a39cbc467ccf0fc728d075452ab21351daaabcb9b4c4177104645f480353734b1ff5302b0f7d6589933c41c7b714acf355ac9756935aecb76035d76

  • SSDEEP

    3072:v7KOlU30lIJxWiiN3t5seAc/Ue0Nc8QsC:hlU30lIJdSt54c/f0Nc8Qs

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.49.123:6666

Targets

    • Target

      shell444.msi

    • Size

      156KB

    • MD5

      237333fa0ad0a1535befa1ed7a4e227b

    • SHA1

      d5ee5ea16376b64828d148f3f1a15be5154cf771

    • SHA256

      138810d2f0a3b9654c3ee32406759db2544b6d916f09e09e5c0e255d44b4b987

    • SHA512

      ca2ee8047a39cbc467ccf0fc728d075452ab21351daaabcb9b4c4177104645f480353734b1ff5302b0f7d6589933c41c7b714acf355ac9756935aecb76035d76

    • SSDEEP

      3072:v7KOlU30lIJxWiiN3t5seAc/Ue0Nc8QsC:hlU30lIJdSt54c/f0Nc8Qs

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks