General

  • Target

    b83f9d0c9e0473562ad106732450410b9f031b8ae3396fb448aa900832a413d9

  • Size

    72KB

  • Sample

    240410-q4hfrahh27

  • MD5

    6dbd612bbc7986cf8beb9984b473330a

  • SHA1

    4b4ea5b54023a40be3a1b791d64f3a2c4ce68b59

  • SHA256

    b83f9d0c9e0473562ad106732450410b9f031b8ae3396fb448aa900832a413d9

  • SHA512

    910d0964372489da9171fc665dae95c36ef8147b492d2b16df726b217844a0eba4f1ac42099a85c4145c58329de6bda9feae2e805e54b1741f9131e53ccff0fe

  • SSDEEP

    1536:IKsAn0AdlGxQSpabNjcMb+KR0Nc8QsJq39:J0MlGxeOe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

128.199.6.246:3432

Targets

    • Target

      b83f9d0c9e0473562ad106732450410b9f031b8ae3396fb448aa900832a413d9

    • Size

      72KB

    • MD5

      6dbd612bbc7986cf8beb9984b473330a

    • SHA1

      4b4ea5b54023a40be3a1b791d64f3a2c4ce68b59

    • SHA256

      b83f9d0c9e0473562ad106732450410b9f031b8ae3396fb448aa900832a413d9

    • SHA512

      910d0964372489da9171fc665dae95c36ef8147b492d2b16df726b217844a0eba4f1ac42099a85c4145c58329de6bda9feae2e805e54b1741f9131e53ccff0fe

    • SSDEEP

      1536:IKsAn0AdlGxQSpabNjcMb+KR0Nc8QsJq39:J0MlGxeOe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks