General

  • Target

    e16a17020ff4d1f2f8630671b347c4a3.bin

  • Size

    1KB

  • Sample

    240329-epzwpsaa22

  • MD5

    e16a17020ff4d1f2f8630671b347c4a3

  • SHA1

    c13751832ab5de512738e20b8fb58c3396fed6d7

  • SHA256

    61e6723a51ac7a47dafbd05478c94fe91833eb5202d97f1018a6a32d77622769

  • SHA512

    5d367e55d45d90dbe36070f5e4afae299bc5d6f5c1805af1529f53fd13b176597c9daa9456467da7c6684566a914d93d4d12f06144ce000dd09340dba1e811d9

Malware Config

Extracted

Family

metasploit

Version

windows/shell_bind_tcp

Targets

    • Target

      file

    • Size

      2KB

    • MD5

      2179f00449e5a927b85770a899487dfb

    • SHA1

      1687223e5db854b80b1b1e9398c15bfa52cf659b

    • SHA256

      1a3454525c414f93905e7ad5d2dd7d558c656f936cb769a3584508a7b1856c82

    • SHA512

      4290be1a15db00f9f0ffecdc75076d41d2530e76617b54d17427dbbeaefd42336b962ba4a5474e06739f1e5dcb925d13caf7bae1500b6b1e00551818b1173499

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks