General

  • Target

    c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401

  • Size

    1.3MB

  • Sample

    240520-j6ez3sbc54

  • MD5

    069e3f823267f523b4e9e78964290e8b

  • SHA1

    e90074ccb79610ca71d6e9bf23f9ba63c52be4b3

  • SHA256

    c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401

  • SHA512

    96ef1f13f6176b1b7b6547802a7fa89f0bd25aa1990d407cc3ceafa7846859427fc0ae9d4a60ad528bfda093844d204ad0a469ad7caace39f8408e3a14446f33

  • SSDEEP

    24576:yDIVZif04z0P24rItaRU4Sn+RfMRoNkXhPitCd0lDNIveX4bcoy0kO:sz0fU4vRfMRoNkRPitR2

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.1:1337

Targets

    • Target

      c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401

    • Size

      1.3MB

    • MD5

      069e3f823267f523b4e9e78964290e8b

    • SHA1

      e90074ccb79610ca71d6e9bf23f9ba63c52be4b3

    • SHA256

      c2fcc8f10f8aac0d0f14b91f3c43f795ad93a47a11e06d15d9db5e9f7f1b2401

    • SHA512

      96ef1f13f6176b1b7b6547802a7fa89f0bd25aa1990d407cc3ceafa7846859427fc0ae9d4a60ad528bfda093844d204ad0a469ad7caace39f8408e3a14446f33

    • SSDEEP

      24576:yDIVZif04z0P24rItaRU4Sn+RfMRoNkXhPitCd0lDNIveX4bcoy0kO:sz0fU4vRfMRoNkRPitR2

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

MITRE ATT&CK Matrix

Tasks