General

  • Target

    ad4124b740a624b574e9f375e2bb872a.bin

  • Size

    1KB

  • Sample

    240307-dkqxkadf99

  • MD5

    67f4f15ef2e5e97ea8acffba8a42e94b

  • SHA1

    e55c795058b755f0fa33959bc1fadb362057f91c

  • SHA256

    bf8a4f7d764d1030903a8f1367162bd431810dfa1f1a189bfbe24b8b8bae289c

  • SHA512

    8e9edba2f1737b7fef2594f87802da3f27d9922e30bd2331f0fafe468d638a959dbba6165768d297c8342edeb1206ce6289b9d4a0ad158b462734477b505214e

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

18.177.60.68:15302

Targets

    • Target

      4f6e8de8f57b96d6342121d01a67a803ba88015de8283122245c5e3a6f4efe0d.ps1

    • Size

      3KB

    • MD5

      ad4124b740a624b574e9f375e2bb872a

    • SHA1

      b481d86d9d1b4d44e950b759ce9ef42fe9598614

    • SHA256

      4f6e8de8f57b96d6342121d01a67a803ba88015de8283122245c5e3a6f4efe0d

    • SHA512

      ad82914cfcfe3a77414a8057b1145bb1e6865d895072af2df342b42dbaca4fa859a48cab0f7805571406c7a0761575c7ade89b601148c517f24aae4592f9f295

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks