General

  • Target

    888dll.dll

  • Size

    8KB

  • Sample

    230705-nskqmadd6t

  • MD5

    fd26a98e95baf880b0519ae0472d04d7

  • SHA1

    f4ef4562f133c69bd73d2a522bb6593688ff2cca

  • SHA256

    ed60346e3ee4818bffdb2986a37d5c46ad0e87b035027e7851cad0ec9e00554a

  • SHA512

    dae18b196a3b3006d9aa63dba5e6b0b41d15b372adc9d654eb6e8349043970cfd2819d8558df3540ad80f171b8e8ee6f1637520e623ec6a2529c87b03d39217d

  • SSDEEP

    48:qUr3zU9G4aNVhnX5hthMt6dchZoKaHxb:+DI0oJ

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.8:888

Targets

    • Target

      888dll.dll

    • Size

      8KB

    • MD5

      fd26a98e95baf880b0519ae0472d04d7

    • SHA1

      f4ef4562f133c69bd73d2a522bb6593688ff2cca

    • SHA256

      ed60346e3ee4818bffdb2986a37d5c46ad0e87b035027e7851cad0ec9e00554a

    • SHA512

      dae18b196a3b3006d9aa63dba5e6b0b41d15b372adc9d654eb6e8349043970cfd2819d8558df3540ad80f171b8e8ee6f1637520e623ec6a2529c87b03d39217d

    • SSDEEP

      48:qUr3zU9G4aNVhnX5hthMt6dchZoKaHxb:+DI0oJ

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks