General

  • Target

    5b09852f737a7f9518f10a123.bin

  • Size

    1KB

  • Sample

    230630-n3khlsac9y

  • MD5

    f05bf1308feac30ae8bf9abf016f8970

  • SHA1

    30a7169f6dfc9ed2b5a910851e1c17c6f61abc24

  • SHA256

    fa6e801fc2e25f98a7d4bfd0a6dd6371c69ba9c4747604be2131faed090ffd96

  • SHA512

    ae2170635cdc61f0aa34c6e1f0b66f475b809c06c6ae4af0d2e324cff75029e815b5c9081304b2f08bed133a3e56bf057107449beb634783fa7724ed04387ecb

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

146.190.48.229:2920

Targets

    • Target

      b5a4977adcb122b2972b3e4566beaf85385bd12ceee14e594d4432e0195c5710.ps1

    • Size

      3KB

    • MD5

      5b09852f737a7f9518f10a1232f7bd1d

    • SHA1

      fecfc91032af2000bc1bdc4b22b639ac5d7c48b3

    • SHA256

      b5a4977adcb122b2972b3e4566beaf85385bd12ceee14e594d4432e0195c5710

    • SHA512

      0715c61b95b9cb50508baee3c1f1d6941c83eaed9ae528cceb9d06a84f04ea009220f1c31f12acc3592d6f3b23dccee6e91bfdbb8f15519ae2828f5d6a3c6e1b

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks