General

  • Target

    585c4661a9f21f1cdab069ed9f19270d52fc79e0e46d86f4b1268342d23b5cb2

  • Size

    42KB

  • Sample

    230820-t2m51agf26

  • MD5

    b75233002e0cae37f56f6019f801bcbf

  • SHA1

    79aacd8c94e996632a7d75f985ed53a184b4c78b

  • SHA256

    585c4661a9f21f1cdab069ed9f19270d52fc79e0e46d86f4b1268342d23b5cb2

  • SHA512

    ab7fe729843780836874d5dcd823f1d6301469e3cc487be337a92437196ca3655de7b48d4379cfd6a61464e7954446d7a01d25b6a52d6a15b7d384d1e4c4bf4b

  • SSDEEP

    768:fv2+z6ZEZbzIa6Jf1O9xQ6eSYntnUlq5o7/NKPMQWtsdBd5qKXaWWa4JMzNxnPVi:fe+z6WbOfQuZSYtnkq5O/0MPoSKRWa4B

Malware Config

Extracted

Family

metasploit

Version

windows/exec

Targets

    • Target

      CARRD.exe

    • Size

      72KB

    • MD5

      2dc87d7f820efb3eb2f9aa422165a08a

    • SHA1

      12fc8afe8bb438493339734b924366765a2974a5

    • SHA256

      39b9590ead8f91f8f9abed4434a84bc76133e3510b198863a225149cd69f66c2

    • SHA512

      8bb3630dcc8d2629e717327a1db2ce82d3576a09823a738500af624ce9c1a5260d7cb96abb6455a8445facffd9aaf77ac87a590dd16afb027add093fae5580f0

    • SSDEEP

      1536:Is46cW9Gy/0Z+Onjs6VE4MquSMb+KR0Nc8QsJq39:J46cW9GyXq52wxe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks