General

  • Target

    070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55.zip

  • Size

    21KB

  • Sample

    231122-r4d9rsdb45

  • MD5

    5f3033400f6d65ed1a916f5e506dbd03

  • SHA1

    a590892b95bb507cd20eed4a5203674cdde531de

  • SHA256

    83fc3e3b9457befadb764ef4d65c517ae2dbd4f0c6104196904b3dcf04f5605f

  • SHA512

    ac441248a7a48662226917bd240c194ba8201a6fed68ed50ed74ecadcda4bb5cf77fc948e46b509fcb234925bdd8634aa8b3191e40ed1f241342e685579605c3

  • SSDEEP

    384:A8gnhBb+aPbpH58vWA5JoLYWdM0BIEpomqJx7blYdUy5u+peL:Un7CaDIWCJoMWdPBII5QFyC2oL

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://47.93.63.179:7498/taO8

Attributes
  • headers User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)

Targets

    • Target

      070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55.doc

    • Size

      24KB

    • MD5

      528264e5e1dc298e49ead0e429569cc7

    • SHA1

      e621a05288ec315e3b0b9566798a028341f497b8

    • SHA256

      070281b8c1a72893182928c21bf7241a0ad8c95879969d5f58e28d08f1a73b55

    • SHA512

      f6980c6f792f5b5be2cf6bfaec425cefa53f80cb9d1cd75bf7e2c5b338cd17b705c8d5a09d4e486c2ead1b5ae371ab94914c251cfadef15ffde2a7b1a53bf0b4

    • SSDEEP

      384:tmt7pThZJrflNF3MZZb2JBfMT9U2uONT+zvevv+42nswKS2UCBzGpFXwB3E:qtTXxf7F3MZZyJ0uiCvI2hKS2UauXwa

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v15

Tasks