General

  • Target

    scpslhack.exe

  • Size

    72KB

  • Sample

    240609-v2y3yadf33

  • MD5

    d763e9a6e3ef84e821ac8e87c99df941

  • SHA1

    b21851eaf5b0a2e59bfa04a215f36fbc125b8603

  • SHA256

    ab2a19d9d656c968f4441aa5cbf317deb30db4c6166f997b35a7989fe17f03e1

  • SHA512

    3feae3cfa759d41a99ce359aca36ec5db6009b90280997d99bb6c27b087612848afc5a7d961f3bc9d05352d823c008aee2ec7fa3e45ff59142e2ad6766c5602e

  • SSDEEP

    1536:IQTO009dgJuajLihrm7tg5f3DUalNomuIDEMb+KR0Nc8QsJq39:dTO00DyzjLQrmxg5fhomme0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

5.11.75.121:4444

Targets

    • Target

      scpslhack.exe

    • Size

      72KB

    • MD5

      d763e9a6e3ef84e821ac8e87c99df941

    • SHA1

      b21851eaf5b0a2e59bfa04a215f36fbc125b8603

    • SHA256

      ab2a19d9d656c968f4441aa5cbf317deb30db4c6166f997b35a7989fe17f03e1

    • SHA512

      3feae3cfa759d41a99ce359aca36ec5db6009b90280997d99bb6c27b087612848afc5a7d961f3bc9d05352d823c008aee2ec7fa3e45ff59142e2ad6766c5602e

    • SSDEEP

      1536:IQTO009dgJuajLihrm7tg5f3DUalNomuIDEMb+KR0Nc8QsJq39:dTO00DyzjLQrmxg5fhomme0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks