General

  • Target

    EXE To Doc_PDF converter.exe

  • Size

    130KB

  • Sample

    240427-mykr5shf4s

  • MD5

    cde8d71a72349b5406dbee88b0075c0f

  • SHA1

    8025625544050e7b6d13f46c5360c37ff6fa8a06

  • SHA256

    a4cacb3f296ba213a18997e9553869e5e71c58e061de68f2d066c6976c101269

  • SHA512

    5700f448eb4740b11f0fad242c5a034aea23ad78490fd23530c7863dbd42a339c57708db74fe059c7374c50c93eb5a345b9362ea7ca8ab1049fa3b7c58291368

  • SSDEEP

    3072:Y+xmKLTN2CA7HjXZpu6gBoutpOnHiKSO/i:Y+MKLZtAPXPu6eoSAHN/i

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

213.57.45.125:444

Targets

    • Target

      EXE To Doc_PDF converter.exe

    • Size

      130KB

    • MD5

      cde8d71a72349b5406dbee88b0075c0f

    • SHA1

      8025625544050e7b6d13f46c5360c37ff6fa8a06

    • SHA256

      a4cacb3f296ba213a18997e9553869e5e71c58e061de68f2d066c6976c101269

    • SHA512

      5700f448eb4740b11f0fad242c5a034aea23ad78490fd23530c7863dbd42a339c57708db74fe059c7374c50c93eb5a345b9362ea7ca8ab1049fa3b7c58291368

    • SSDEEP

      3072:Y+xmKLTN2CA7HjXZpu6gBoutpOnHiKSO/i:Y+MKLZtAPXPu6eoSAHN/i

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks