General

  • Target

    eea3578523385463dc00539e16c73c1546130b7f6c9bed79cb372b774cde00f4

  • Size

    49KB

  • Sample

    240525-fal7qsef8y

  • MD5

    fd08264783003cf2f5dc5306db4347be

  • SHA1

    ede0e601e6a66f856a4b181233bfb14d322ac8cb

  • SHA256

    eea3578523385463dc00539e16c73c1546130b7f6c9bed79cb372b774cde00f4

  • SHA512

    63971ceae00bc16bb6a128763f388f47753325de318581ded6593079359efbe5072279f9020a7dafe641322290d0b3362096e9f35f2fbdc30f6091f619fb5c75

  • SSDEEP

    768:4PqrMmObj9L/Ya/lflCOanzoDfkptTfIaz+ggrUN+nNnmtZxjw36HZeE6KlQ:WqrxOtflIcfknfxTgrU4lG7j4SZevKO

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

172.16.1.100:44344

Targets

    • Target

      hacker.exe

    • Size

      72KB

    • MD5

      f17fc73c83113bc83e9fe6f55e0b7125

    • SHA1

      41ad3bd3345d60eb4c8d7f9a40693498de6eaa03

    • SHA256

      b480288ead997c4502bb0561617e9e8406aeaedd6521b56508391bc3dc24a254

    • SHA512

      8eb883a196af0236592a156cb3277d8cc98b7fc53b9b4b6ccfd23bb8e780e114d4747de91d8d7c32214a0c5d122f9947cc5f7c9af10cb3e17202103be3addbb4

    • SSDEEP

      1536:Ia7bO9CT0LUrxaCyc7lVhUevU9Z4GFMb+KR0Nc8QsJq39:FvKMUtZ46e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks