General

  • Target

    cloud2023.exe

  • Size

    72KB

  • Sample

    240418-lpg48aaf7x

  • MD5

    e4c8db87df914e2cc3c3d55e95d29907

  • SHA1

    3bd961f3ae23a39b5992d9f4d9f2253a01bd412c

  • SHA256

    32443ff6cc718267d771e0f9dbce1e32c93c5b210630180b6a5f52f063327d14

  • SHA512

    07b98caa8ea688970b250bfd608d3c3418609409d2e7bce112c21f112529d9a053896df37187722298f710f33d619102a8650fd733340d39c9eb68a954b41b6d

  • SSDEEP

    1536:IHxdeH6aZQLOpKoKCD0K3bRaYMb+KR0Nc8QsJq39:uxdeduNKlaYe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

3.84.7.209:4443

Targets

    • Target

      cloud2023.exe

    • Size

      72KB

    • MD5

      e4c8db87df914e2cc3c3d55e95d29907

    • SHA1

      3bd961f3ae23a39b5992d9f4d9f2253a01bd412c

    • SHA256

      32443ff6cc718267d771e0f9dbce1e32c93c5b210630180b6a5f52f063327d14

    • SHA512

      07b98caa8ea688970b250bfd608d3c3418609409d2e7bce112c21f112529d9a053896df37187722298f710f33d619102a8650fd733340d39c9eb68a954b41b6d

    • SSDEEP

      1536:IHxdeH6aZQLOpKoKCD0K3bRaYMb+KR0Nc8QsJq39:uxdeduNKlaYe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks