General

  • Target

    2f2e5bc8263bb7aa069dc9785e6322b9cc414ae2f7dedf4890aabbc071c0dfed

  • Size

    72KB

  • Sample

    240509-yvrbasca7x

  • MD5

    cb62209b66e52cbce511a69e3beb65ab

  • SHA1

    efe847a3f69c8f8150c650a9b582f4bf89557cd6

  • SHA256

    2f2e5bc8263bb7aa069dc9785e6322b9cc414ae2f7dedf4890aabbc071c0dfed

  • SHA512

    3db0c04e21537518bae23e9d9be29a7f189143110649d5c48482094965dc47f761f6f2dff1f49d20422615ef9fd6941a0f234ebf12bf4c62466a586e11056bc1

  • SSDEEP

    1536:IWfeCBAm1c/5bNzDUt2WkzEPZnXH8vMb+KR0Nc8QsJq39:ZfBBA6c/5ZqoE6ve0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

80.195.5.133:6722

Targets

    • Target

      2f2e5bc8263bb7aa069dc9785e6322b9cc414ae2f7dedf4890aabbc071c0dfed

    • Size

      72KB

    • MD5

      cb62209b66e52cbce511a69e3beb65ab

    • SHA1

      efe847a3f69c8f8150c650a9b582f4bf89557cd6

    • SHA256

      2f2e5bc8263bb7aa069dc9785e6322b9cc414ae2f7dedf4890aabbc071c0dfed

    • SHA512

      3db0c04e21537518bae23e9d9be29a7f189143110649d5c48482094965dc47f761f6f2dff1f49d20422615ef9fd6941a0f234ebf12bf4c62466a586e11056bc1

    • SSDEEP

      1536:IWfeCBAm1c/5bNzDUt2WkzEPZnXH8vMb+KR0Nc8QsJq39:ZfBBA6c/5ZqoE6ve0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks