General

  • Target

    2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber

  • Size

    11.8MB

  • Sample

    240527-hcmmdsbb8w

  • MD5

    a3fdda6699341de4b5d9baa69d4128f9

  • SHA1

    be119f2349951146c8ee697cb556a2fd373a2772

  • SHA256

    bf341af967eb41cec554c11507086e20a0313190c2543f73917f2ffbe38724a1

  • SHA512

    e8410c8e03711445ffc23b79a96f3f379d94b7507a1d42280a703282b61599489d71a0655ccfb6f8f131e5f0c57b5ee84e5cd2b70597060a2dd8c2ca08c2fd0f

  • SSDEEP

    196608:t19Ki8a/Qa4vHdlounj1SHNURgXjZFuGhNIMPSvoTk91HJd2OhZ9se8pF8w/wobr:t3Ki5IDvHd+ujFOXjbNIMYCI1WOhY/wc

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.56.110:4444

Targets

    • Target

      2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber

    • Size

      11.8MB

    • MD5

      a3fdda6699341de4b5d9baa69d4128f9

    • SHA1

      be119f2349951146c8ee697cb556a2fd373a2772

    • SHA256

      bf341af967eb41cec554c11507086e20a0313190c2543f73917f2ffbe38724a1

    • SHA512

      e8410c8e03711445ffc23b79a96f3f379d94b7507a1d42280a703282b61599489d71a0655ccfb6f8f131e5f0c57b5ee84e5cd2b70597060a2dd8c2ca08c2fd0f

    • SSDEEP

      196608:t19Ki8a/Qa4vHdlounj1SHNURgXjZFuGhNIMPSvoTk91HJd2OhZ9se8pF8w/wobr:t3Ki5IDvHd+ujFOXjbNIMYCI1WOhY/wc

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks