General

  • Target

    bitch.exe

  • Size

    72KB

  • Sample

    240430-wlf3vseb72

  • MD5

    a13e7aec1427a7d7754f88bc497db13a

  • SHA1

    17b237e46fe8f07531e3a9bb99360dbf8fae875d

  • SHA256

    7cc977780d1eb0233a5455d1b776b3fc480338ee11c6dee8f27c3861e114db92

  • SHA512

    c428d863afaee62879662ea95cfa20dba0b82f24079d380e0d0cd5d613631933f975e1d0c350e4c0dde90b85db8454d157ef130d8aa16385cd6f030217fa51ea

  • SSDEEP

    1536:IY7cR/axzO+K98WLEZu6t3jcIKGTZWGMb+KR0Nc8QsJq39:JQR/afK9pOuCjLxe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.23.205:4444

Targets

    • Target

      bitch.exe

    • Size

      72KB

    • MD5

      a13e7aec1427a7d7754f88bc497db13a

    • SHA1

      17b237e46fe8f07531e3a9bb99360dbf8fae875d

    • SHA256

      7cc977780d1eb0233a5455d1b776b3fc480338ee11c6dee8f27c3861e114db92

    • SHA512

      c428d863afaee62879662ea95cfa20dba0b82f24079d380e0d0cd5d613631933f975e1d0c350e4c0dde90b85db8454d157ef130d8aa16385cd6f030217fa51ea

    • SSDEEP

      1536:IY7cR/axzO+K98WLEZu6t3jcIKGTZWGMb+KR0Nc8QsJq39:JQR/afK9pOuCjLxe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks