General

  • Target

    2024-05-25_c30c47fa7d1e49930eccc470d9838e28_avoslocker

  • Size

    3.2MB

  • Sample

    240525-pqtfesbe67

  • MD5

    c30c47fa7d1e49930eccc470d9838e28

  • SHA1

    14ad3df5ffff9b2bc55a8d67667d8b073e647e48

  • SHA256

    1b9c1698a9f6b39d0d1267b457657c2ffc5064d407945702c46691d64e69e03a

  • SHA512

    12e7b42b9b22d6bea1ed1d1934dee5127e52abedd4235366751af955bd7c10482075cebfc4930c599f98590f580a134a2ecdc75dd97a7d52b98b96668cae9e23

  • SSDEEP

    49152:W3+BF5f37D5to87s3Kv3mqI6VeOMjUfkptVxIyijdTNEW8PhehJqe:W3+BFB3X7oMs3Kv3mjUu5SP

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.0.5:443

Targets

    • Target

      2024-05-25_c30c47fa7d1e49930eccc470d9838e28_avoslocker

    • Size

      3.2MB

    • MD5

      c30c47fa7d1e49930eccc470d9838e28

    • SHA1

      14ad3df5ffff9b2bc55a8d67667d8b073e647e48

    • SHA256

      1b9c1698a9f6b39d0d1267b457657c2ffc5064d407945702c46691d64e69e03a

    • SHA512

      12e7b42b9b22d6bea1ed1d1934dee5127e52abedd4235366751af955bd7c10482075cebfc4930c599f98590f580a134a2ecdc75dd97a7d52b98b96668cae9e23

    • SSDEEP

      49152:W3+BF5f37D5to87s3Kv3mqI6VeOMjUfkptVxIyijdTNEW8PhehJqe:W3+BFB3X7oMs3Kv3mjUu5SP

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks